Skip to content

Instantly share code, notes, and snippets.

View fuzzbuster's full-sized avatar
:octocat:
Studying Ninjutsu hard

N1nJi4.X fuzzbuster

:octocat:
Studying Ninjutsu hard
  • Pentest Ninja Dojo
  • 木ノ葉の里
View GitHub Profile
@jonaskello
jonaskello / prep-windows-node-step1.ps1
Last active April 7, 2026 12:33
Install k8s windows nodes
# Make sure you have enabled "Expose hardware assisted virtualization to the guest OS" for the VMWare CPU
Write-Host "##############################`nInstalling features: Containers, Hyper-V, Hyper-V-PowerShell`n##############################`n"
Install-WindowsFeature Containers
Install-WindowsFeature Hyper-V
Install-WindowsFeature Hyper-V-PowerShell
Write-Host "##############################`nDisabling firewall`n##############################`n"
Set-NetFirewallProfile -Profile Domain,Public,Private -Enabled False
@d-513
d-513 / arch-ovh.md
Last active May 6, 2026 08:42
Arch Linux on OVH VPS

Install Arch on OVH VPS

This guide will show you how to install Arch Linux on an OVH VPS.
As you may have noticed, OVH does not have an Arch image, which is a problem. Follow these instructions to install Arch using recovery mode.

Conventions

Assume anything reffered to as low ram vps in the guide to be a VPS with <8gb ram

This guide assumes the following:

  • Your VPS has one drive
@skahwah
skahwah / hollow.cs
Last active March 20, 2024 07:55
Custom assembly that is compatible with SQL CLR attacks.
//C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe /target:library c:\temp\hollow.cs
//SQLRecon.exe /auth:local /host:SQL02 /username:sa /password:Password123 /module:clr /dll:c:\temp\hollow.dll /function:BaconTime
using System;
using System.Data;
using System.Data.SqlClient;
using System.Data.SqlTypes;
using System.Diagnostics;
using System.IO;
using System.Runtime.InteropServices;
using Microsoft.SqlServer.Server;
@nachtmaar
nachtmaar / keepassxc-autotype-password-to-iterm2-in-tmux.md
Last active June 19, 2024 18:02
KeePassXC Auto-Type on iTerm2/zsh/Tmux

KeePass Auto-Type on iTerm2/zsh/Tmux

This is a very quick tutorial on how to auto-type passwords from KeePassXC to a CLI application. The document is mostly for myself to remember how to do it, but feel free to add your comments and improvements.

Context

I use KeePassXC as my main password manager. About a couple of months ago I discovered I don't need to copy passwords from KeepassXC via clipboard. I found out about the Auto-Type feature in the KeepassXC User Guide. According to the user guide, Auto-Type "acts like a virtual keyboard to populate data from your entries directly into the corresponding websites or applications that you use".

This is great for websites since I don't need any browser plugin. Instead I just press CTRL-Option-A (in my case) and let the user and password fields be auto-completed using KeepassXC. in order to do this correctly, you can configure a Window-Association. This is usually the title of a website as f

@franklinmoy3
franklinmoy3 / opkg_updater.sh
Last active February 21, 2026 10:09
OpenWRT OPKG update all installed packages
#!/bin/sh
# Example of job definition (as add job using crontab -e):
# .---------------- minute (0 - 59)
# | .------------- hour (0 - 23)
# | | .---------- day of month (1 - 31)
# | | | .------- month (1 - 12) OR jan,feb,mar,apr ...
# | | | | .---- day of week (0 - 6) (Sunday=0 or 7) OR sun,mon,tue,wed,thu,fri,sat
# | | | | |
# * * * * * user-name command to be executed
# 30 02 15,28 * * /root/opkg_updater.sh
@rmrfslashbin
rmrfslashbin / Darwin.md
Last active April 16, 2026 07:24
Minimal MacOS setup guide. System/UI and CLI (zsh, Oh My Zsh, brew, etc).
# add RKE2 binaries to path
export PATH=$PATH:/var/lib/rancher/rke2/bin
echo "export PATH=$PATH:/var/lib/rancher/rke2/bin" >> ~/.bashrc
# copy RKE2 kubeconfig file to the default location
mkdir ~/.kube
cp /etc/rancher/rke2/rke2.yaml ~/.kube/config
chmod 600 ~/.kube/config
# verify the configuration
apt-get update && apt-get install -y locales
export LANGUAGE=en_US.UTF-8
export LANG=en_US.UTF-8
export LC_ALL=en_US.UTF-8
locale-gen en_US.UTF-8
dpkg-reconfigure locales
@audibleblink
audibleblink / Workstation-Takeover.md
Created July 25, 2021 21:46 — forked from gladiatx0r/Workstation-Takeover.md
From RPC to RCE - Workstation Takeover via RBCD and MS-RPChoose-Your-Own-Adventure

Overview

In the default configuration of Active Directory, it is possible to remotely take over Workstations (Windows 7/10/11) and possibly servers (if Desktop Experience is installed) when their WebClient service is running. This is accomplished in short by;

  • Triggering machine authentication over HTTP via either MS-RPRN or MS-EFSRPC (as demonstrated by @tifkin_). This requires a set of credentials for the RPC call.
  • Relaying that machine authentication to LDAPS for configuring RBCD
  • RBCD takeover

The caveat to this is that the WebClient service does not automatically start at boot. However, if the WebClient service has been triggered to start on a workstation (for example, via some SharePoint interactions), you can remotely take over that system. In addition, there are several ways to coerce the WebClient service to start remotely which I cover in a section below.

@ResistanceIsUseless
ResistanceIsUseless / Header-Injection.yaml
Last active February 13, 2026 06:26
Nuclei SSRF Fuzzing Template
id: header-injection
info:
name: Header SSRF Injection
author: nullrabbit
severity: high
description: Fuzzing headers for OOB SSRF
tags: fuzz,ssrf
requests: