I hereby claim:
- I am jbarcia on github.
- I am josephbarcia (https://keybase.io/josephbarcia) on keybase.
- I have a public key whose fingerprint is 4700 BEC7 8292 C129 B57B 6CCF 3C65 8F3B BB27 3BE5
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
| function Get-DownloadedPEHashes | |
| { | |
| [CmdletBinding()] | |
| Param( | |
| [Parameter(Mandatory=$true, Position=0)] | |
| [String]$Path, | |
| [Switch]$Recursive = $true | |
| ) | |
| if (!$Path.EndsWith('\')) |
| #!/usr/bin/env ruby | |
| # -*- coding: binary -*- | |
| # | |
| # Poison a system's NetBIOS resolver for the WPAD name (not BadTunnel) | |
| # | |
| # Usage: ruby netbios-brute-local.rb <evil-wpad-server> <target-ip> <target-port> <pps> | |
| # Contact: x[at]hdm.io | |
| # License: https://opensource.org/licenses/BSD-2-Clause | |
| # |
| #!/usr/bin/env ruby | |
| # -*- coding: binary -*- | |
| # | |
| # Poison a system's NetBIOS resolver for the WPAD name from outside NAT (not BadTunnel) | |
| # | |
| # Usage: ruby netbios-brute-nat.rb <evil-wpad-server> <pps> | |
| # Contact: x[at]hdm.io | |
| # License: https://opensource.org/licenses/BSD-2-Clause | |
| # |
| using System; | |
| using System.Diagnostics; | |
| using System.Runtime.InteropServices; | |
| using RGiesecke.DllExport; | |
| namespace Export | |
| { | |
| class Test | |
| { |
| #!/bin/bash | |
| # update apt-get | |
| export DEBIAN_FRONTEND="noninteractive" | |
| sudo apt-get update | |
| # remove previously installed Docker | |
| sudo apt-get purge lxc-docker* | |
| sudo apt-get purge docker.io* |
| This is a list of SQL Server commands that support UNC path [injections] by default. | |
| The injections can be used to capture or replay the NetNTLM password hash of the | |
| Windows account used to run the SQL Server service. The SQL Server service account | |
| has sysadmin privileges by default in all versions of SQL Server. | |
| Note: This list is most likely not complete. | |
| ----------------------------------------------------------------------- | |
| -- UNC Path Injections Executable by the Public Fixed Server Role | |
| ----------------------------------------------------------------------- |
| <# | |
| Invoke-Kerberoast.ps1 | |
| Author: Will Schroeder (@harmj0y), @machosec | |
| License: BSD 3-Clause | |
| Required Dependencies: None | |
| Credit to Tim Medin (@TimMedin) for the Kerberoasting concept and original toolset implementation (https://github.com/nidem/kerberoast). | |
| Note: the primary method of use will be Invoke-Kerberoast with various targeting options. |
| <Project ToolsVersion="4.0" xmlns="http://schemas.microsoft.com/developer/msbuild/2003"> | |
| <!-- This inline task executes c# code. --> | |
| <!-- C:\Windows\Microsoft.NET\Framework64\v4.0.30319\msbuild.exe pshell.xml --> | |
| <!-- Author: Casey Smith, Twitter: @subTee --> | |
| <!-- License: BSD 3-Clause --> | |
| <PropertyGroup> | |
| <FunctionName Condition="'$(FunctionName)' == ''">None</FunctionName> | |
| <Cmd Condition="'$(Cmd)' == ''">None</Cmd> | |
| </PropertyGroup> | |
| <Target Name="Hello"> |
| # Get-SystemDriver requires the ConfigCI module on Win10 Enterprise | |
| # This will collect all signer information for all PEs in C:\ | |
| # This will take a while!!! | |
| $Signers = Get-SystemDriver -ScanPath C:\ -UserPEs | |
| # Associate the subject name of each certificate to the file/signer info | |
| # so we can correlate the two. | |
| $CertSubjectMapping = $Signers | % { | |
| $Signer = $_ |