Skip to content

Instantly share code, notes, and snippets.

@santaklouse
santaklouse / openssl_commands.md
Created July 14, 2022 15:41 — forked from Hakky54/openssl_commands.md
Some list of openssl commands for check and verify your keys

openssl 🔐

Install

Install the OpenSSL on Debian based systems

sudo apt-get install openssl
@santaklouse
santaklouse / allinone.md
Last active July 13, 2022 12:38
Key core, container, initial exploring with EBPF offensive and defensive

This article was transcoded by Jian Yue SimpRead, the original address bbs.pediy.com

[Original] Kernel, container, and eBPF attack and defense

[](#Kernel, container, and eBPF attack and defense) Kernel, container, and eBPF attack and defense

Table of contents

  • [Kernel, container, and eBPF attack and defense preliminary exploration] (#kernel, container, and ebpf attack and defense preliminary exploration)
#!/bin/bash -e
###################
# ARRAY UTILITIES #
###################
function arrayToParameters()
{
local -r array=("${@}")
@santaklouse
santaklouse / zerotier_install.sh
Created June 17, 2022 23:31
asuswrt padawan zerotier without usb flash
#!/bin/bash
echo 'Mounting /opt'
mount -t tmpfs tmpfs /opt
echo 'enabling opkg package manager...'
/usr/bin/opkg.sh > /dev/null
#!/usr/bin/env bash
[ "$1" == "l" ] && docker ps && exit;
[ "$1" == "c" ] && docker run -it -d -P --name kali-m1 --mount type=bind,source=/Users/alexnevpryaga/mnt/pentest,target=/home/shared/pentest --mount type=bind,source=/Users/alexnevpryaga/Downloads,target=/home/shared/downloads --cap-add=NET_ADMIN --cap-add=SYS_ADMIN --device /dev/net/tun santaklouse/kali-m1:latest > /dev/null && exit;
[ "$1" == "s" ] && docker start -a -i kali-m1 && exit
[ "$1" == "b" ] && docker exec -it kali-m1 /bin/bash && exit
@santaklouse
santaklouse / README.md
Last active June 6, 2022 16:07
scan wifi

?

run scan_wifi.sh in order to mount remote folder by sshfs and start wifi traffic monitor/scan/save and write to mounted dir

@santaklouse
santaklouse / pidsof.sh
Created June 4, 2022 21:09
get pids of process names
function pidsof() {
pids=(`pgrep "$1"`, `pidof "$1"`, `ps -Ac | grep -m1 '"$1"\$' | awk '{print \$1}'`)
pids=$piods|tr ',' ' '
echo pids
#
# strings=(`pgrep "$a"`, `pidof "$a"`, `ps -Ac | grep -m1 '"$a"\$' | awk '{print \$1}'`)
#
# pids=()
@santaklouse
santaklouse / README.md
Created May 9, 2022 14:33
Windows Magic Packet a sniffing, non binding, reverse down/exec, portknocking service

dragon

dragon.c: a sniffing, non binding, reverse down/exec, portknocking service * Based on cd00r.c by [email protected] and helldoor.c by [email protected].

Compiles as a windows service. Once installed & started, it'll listen (using winpcap) to all interfaces on the machine. If a packet comes across with the "magic source port", it'll reach out using wget to download and execute a binary based off of the src ip of the senders packet.

As it stands the the "magic source port" is 12317. To change this, you can modify the option listed in the accepted source port in the function "packet_handler".

To compile use MinGW's version of gcc.

@santaklouse
santaklouse / README.md
Last active May 9, 2022 14:27
Adds to bash env command for search cheatsheets (from cheat.sh)

Adds to bash env command for search cheatsheets (from cheat.sh)

Install

this will add function to ~/.bashrc file (create it if needed)

bash -c "$(curl -fsSL https://cutt.ly/HG6lFaV)"

Example:

@santaklouse
santaklouse / README.md
Last active April 10, 2022 00:05
Download all site image files (image files stored without file extension) and rename by adding correct extension

Run it in console:

bash -c "$(curl -fsSL https://t.ly/h7wB)"