Skip to content

Instantly share code, notes, and snippets.

View hotelzululima's full-sized avatar

hotelzululima hotelzululima

View GitHub Profile
@hotelzululima
hotelzululima / twitter_reset.md
Created January 30, 2025 09:13 — forked from gmolveau/twitter_reset.md
Twitter reset scripts

Twitter Reset

Ces scripts permettent de vider le flux d'activité d'un compte twitter : RT, likes, tweets.

Those scripts will flush your twitter activity feed : likes, RT, tweets...

Ces scripts ne fonctionnent que pour twitter en langue anglaise. (https://twitter.com/settings/language)

Those scripts only work for twitter in english.

@hotelzululima
hotelzululima / Get-SiteServerCurrentUser.ps1
Created January 24, 2025 03:57 — forked from Mayyhem/Get-SiteServerCurrentUser.ps1
Query SCCM site server remote registry for the currently logged on user account
function Get-SiteServerCurrentUser {
[CmdletBinding()]
param(
[Parameter(Mandatory=$true)]
[string]$ComputerName,
[Parameter(Mandatory=$false)]
[string]$SubKeyPath = "SOFTWARE\Microsoft\SMS\CurrentUser"
)
@hotelzululima
hotelzululima / core_pattern_escape.sh
Created October 26, 2024 19:12 — forked from magisterquis/core_pattern_escape.sh
Script to escape a container with /proc/sys/kernel/core_pattern reusing the existing shell's stdio
#!/bin/bash
#
# core_pattern_escape.sh
# Simple script to escape a container via /proc/sys/kernel/core_pattern
# By J. Stuart McMurray
# Created 20241026
# Last Modified 20241026
# Drop to /esc (or whatever name) in a container and...
#
@hotelzululima
hotelzululima / PSWA.md
Created September 3, 2024 19:58 — forked from MHaggis/PSWA.md

Enable PowerShell Web Access like an APT

Ref: https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-241a

PowerShell:

# PrivCheck
if (-NOT ([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) {
    Write-Warning "Please run this script as an Administrator!"
    Exit
@hotelzululima
hotelzululima / iridium-sdr.md
Created April 13, 2024 20:49 — forked from GrayHatGuy/iridium-sdr.md
Iridium satellite cheat sheet for hackrf SDR capture using gr-iridium iridium-toolkit and iridium live

Description

This details how to capture voice text and rings associated with iridium satellite rebroadcasts of the Aircraft Communications Addressing and Report System (ACARS)

Prerequisites:

  • Start installation in home directory preferred
    cd ~
    
  • Install the following repos preferably from source or using apt in home directory or /usr/scr/:

ELF Format Cheatsheet

Introduction

Executable and Linkable Format (ELF), is the default binary format on Linux-based systems.

ELF

Compilation

@hotelzululima
hotelzululima / _deobfuscating-unminifying-obfuscated-web-app-code.md
Created January 18, 2024 08:20 — forked from 0xdevalias/_deobfuscating-unminifying-obfuscated-web-app-code.md
Some notes and tools for reverse engineering / deobfuscating / unminifying obfuscated web app code
import pandas as pd
# Load the data
df = pd.read_excel('pnas.2118631119.sd01.xlsx')
from bs4 import BeautifulSoup
# Load the HTML file
with open('crime.html', 'r') as f:
contents = f.read()
@hotelzululima
hotelzululima / exproler_config.txt
Created July 12, 2023 02:08 — forked from usualsuspect/exproler_config.txt
Pokemon Cobalt Strike Config
BeaconType - HTTPS
Port - 443
SleepTime - 10000
MaxGetSize - 1398322
Jitter - 20
MaxDNS - Not Found
PublicKey_MD5 - e516ca02d126b82ff30593ce45d9cba5
C2Server - 47.94.58.82,/api/v1/server/user/info
UserAgent - Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36
HttpPostUri - /api/v1/server/log
*.1ucrs.com
*.35mules.com
*.42-q.com
*.42-q.io
*.a0.usfoods.com
*.abc.xyz
*.about.nordstrom.com
*.activatethecard.com
*.activision.com
*.activisionblizzard.com