Skip to content

Instantly share code, notes, and snippets.

@jermdw
jermdw / sysctl.conf
Created December 21, 2017 00:59
Hardened /etc/sysctl.conf
# Enable syn flood protection
net.ipv4.tcp_syncookies = 1
# Ignore source-routed packets
net.ipv4.conf.all.accept_source_route = 0
# Ignore source-routed packets
net.ipv4.conf.default.accept_source_route = 0
# Ignore ICMP redirects
@jermdw
jermdw / Kali 2017.1 x64, Docker-ce Install script
Created December 20, 2017 16:00 — forked from nikallass/Kali 2017.1 x64, Docker-ce Install script
Kali 2017.1 x64, Docker-ce Install script
#!/bin/bash
# update apt-get
export DEBIAN_FRONTEND="noninteractive"
sudo apt-get update
# remove previously installed Docker
sudo apt-get remove docker docker-engine docker.io* lxc-docker*
# install dependencies 4 cert
@jermdw
jermdw / windows_powershell_prompt_setup.md
Last active August 16, 2024 20:00
Quick Setup for Windows Powershell Prompt

Quick Setup for Windows Powershell Prompt

Set your PowerShell execution policy

Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Force

Install Chocolatey

@jermdw
jermdw / windows_keyboard_shortcuts.md
Last active December 13, 2017 03:36
Windows Keyboard Shortcuts

Windows Keyboard Shortcuts

Keyboard shortcut Action
Windows key Open or close Start Menu.
Windows key + A Open Action center.
Windows key + C Open Cortana in listening mode.
Windows key + D Display and hide the desktop.
Windows key + E Open File Explorer.
Windows key + G Open Game bar when a game is ope
@jermdw
jermdw / nix-helper.md
Last active August 16, 2024 20:00
Nix-One-Liners
@jermdw
jermdw / iterm2.md
Created December 11, 2017 18:49 — forked from squarism/iterm2.md
iterm2 cheatsheet

Tabs and Windows

Function Shortcut
Fullscreen + Enter
Previous Tab + Left Arrow
Next Tab + Right Arrow
Go to Tab + Number
Go to Window + Option + Number
Go to Split Pane by Direction + Option + Arrow
@jermdw
jermdw / bypass_exec-policy.ps1
Created December 9, 2017 00:02
Bypass Execution Policy No Matter What!
# Reference - http://community.idera.com/powershell/powertips/b/tips/posts/allowing-powershell-script-execution---no-matter-what
$context = $executioncontext.gettype().getfield('_context','nonpublic,instance').getvalue($executioncontext); $field = $context.gettype().getfield('_authorizationManager','nonpublic,instance'); $field.setvalue($context,(New-Object management.automation.authorizationmanager 'Microsoft.PowerShell'))
@jermdw
jermdw / winblowz.md
Created December 7, 2017 18:21
Winblowz Quickies

Winblowz Quickies

Elevate to System using PSEXEC

Reference

Elevate

PSEXEC -i -s -d CMD

Verify

@jermdw
jermdw / adblocker.ps1
Created November 30, 2017 00:08
Block Ads via Hosts local file
iwr -Method GET -Uri https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts -OutFile "C:\Windows\System32\drivers\etc\hosts"
ipconfig /flushdns
@jermdw
jermdw / tanium_hunting_questions.md
Last active January 2, 2024 18:50
Tanium Hunting Questions

Tanium Hunting Questions

Initial Infection

New Scripts in Webroot Paths

Get "Trace File Operations[unlimited, 1488479715768|1488483314768, 1, 0, 0, 10, .*\\wwwroot\\.*\.(asp|aspx|cfm|jsp|php), CreateNewFile, , , ]" from all machines