Skip to content

Instantly share code, notes, and snippets.

View opexxx's full-sized avatar

Alexander Knorr opexxx

View GitHub Profile
@opexxx
opexxx / search-document-by-percol.zsh
Last active September 4, 2015 10:31 — forked from sankitch/search-document-by-percol.zsh
ドキュメントを絞り込んで開く
function search-document-by-percol() {
DOCUMENT_DIR="$HOME/Dropbox/Documents/ $HOME/Desktop/ $HOME/Google\ ドライブ"
SELECTED_FILE=$(echo $DOCUMENT_DIR | xargs find | \
grep -E "\.(xlsx|xls|pptx|ppt|docx|doc|pdf|txt|odp|odt|ods|xmind|mm|glink|gsheet)$" | percol --match-method migemo)
if [ $? -eq 0 ]; then
cygstart $SELECTED_FILE
fi
}
alias sd='search-document-by-percol'

Keybase proof

I hereby claim:

  • I am opexxx on github.
  • I am opexxx (https://keybase.io/opexxx) on keybase.
  • I have a public key whose fingerprint is A80C 890B 8AC6 DE59 910F 76EF DEFF 6815 6667 8BE4

To claim this, I am signing this object:

@opexxx
opexxx / cue_splitting.sh
Created July 7, 2016 13:06 — forked from skarllot/cue_splitting.sh
CUE Splitting
# Ref: https://wiki.archlinux.org/index.php/CUE_Splitting
shnsplit -f audio.cue -t "%n. %p - %t" -o flac audio.flac
cuetag.sh audio.cue [01]*.flac
@opexxx
opexxx / lolbandwidth.py
Last active July 7, 2016 13:12 — forked from atucom/lolbandwidth.py
automatically log speedtest results to file with timestamp for logging.
#!/usr/bin/python
#stolen and modified from the reddit post about the raspbeery pi tweeting at comcast
#run this every 10 minutes (or w/e) with cron:
#"crontab -e"
#*/10 * * * * /home/pi/lolbandwidth.py
import os
import sys
import csv
import datetime
import time
@opexxx
opexxx / secretsdump_help
Created July 7, 2016 13:15 — forked from v-egoshin/secretsdump_help
Secretsdump startup help
Impacket v0.9.11 - Copyright 2002-2014 Core Security Technologies
usage: secretsdump.py [-h] [-debug] [-system SYSTEM] [-security SECURITY]
[-sam SAM] [-ntds NTDS] [-history]
[-outputfile OUTPUTFILE] [-hashes LMHASH:NTHASH]
target
positional arguments:
target [domain/][username[:password]@]<address> or LOCAL (if
you want to parse local files)
@opexxx
opexxx / FireEyeCommands.txt
Last active February 16, 2017 09:01
fireEye cms
ena
conf t c
sh fenet image status
show file system detail
fenet image fetch
show image
fenet metadata refresh
ipmi firmware reload
@opexxx
opexxx / autodump_powershell_process.ps1
Created October 17, 2016 04:15 — forked from mattifestation/autodump_powershell_process.ps1
Automatically capture a full PowerShell memory dump upon any PowerShell host process termination
$EventFilterArgs = @{
EventNamespace = 'root/cimv2'
Name = 'PowerShellProcessStarted'
Query = 'SELECT FileName, ProcessID FROM Win32_ModuleLoadTrace WHERE FileName LIKE "%System.Management.Automation%.dll"'
QueryLanguage = 'WQL'
}
$Filter = New-CimInstance -Namespace root/subscription -ClassName __EventFilter -Property $EventFilterArgs
$CommandLineConsumerArgs = @{
@opexxx
opexxx / PowerforensicsInstall.ps1
Created October 21, 2016 07:24
PowerforensicsInstall
# Make sure the module is not loaded
Remove-Module Powerforensics -ErrorAction SilentlyContinue
# Download latest version
$webclient = New-Object System.Net.WebClient
$url = "https://github.com/Invoke-IR/PowerForensics/archive/master.zip"
Write-Host "Downloading latest version of Powerforensics from $url" -ForegroundColor Cyan
$file = "$($env:TEMP)\Powerforensics.zip"
$webclient.DownloadFile($url,$file)
Write-Host "File saved to $file" -ForegroundColor Green
# Unblock and Decompress
$name = 'Dammaschke' # Change
$NetworkCategory = 1 # 0 = Public, 1 = Private (2 = Domain, but not setable)
$profile = Get-CimInstance -Namespace root/StandardCimv2 -ClassName MSFT_NetConnectionProfile|Where-Object Name -EQ $name
$profile.NetworkCategory = $NetworkCategory
Set-CimInstance $profile
function Get-AvailableComObjects {
$classesCom = ''
$classes = [Microsoft.Win32.Registry]::LocalMachine.OpenSubKey('SOFTWARE\\Classes').GetSubKeyNames()
[regex]::Matches($classes, '\w+\.\w+').Value | % {if ([Microsoft.Win32.Registry]::LocalMachine.OpenSubKey("SOFTWARE\\Classes\\$_\\CLSID")) {$classesCom += "$_`r`n"}}
$classesCom.Replace("`r`n",' ').Split(' ') | Select-Object -Unique
}