Skip to content

Instantly share code, notes, and snippets.

View sathwikv143's full-sized avatar
🖥️
Working my ass off

Sathwik Mohan sathwikv143

🖥️
Working my ass off
View GitHub Profile
@RomelSan
RomelSan / Powershell-Incident-CheatSheet.ps1
Created August 20, 2020 19:04
Incident Response: Windows Cheatsheet
# Incident Response: Windows Cheatsheet
# Commands for CMD / Powershell / GUI
# Check user accounts
lusrmgr.msc
# See the user accounts for the system and the type of account it is
net user
Get-LocalUser
# Check Administrators
net localgroup administrators
@dustyfresh
dustyfresh / secrets.yara
Last active October 11, 2022 21:26
yara signatures converted from trufflehog regexes for identifying secrets in text files
/*
Yara signatures for identifying secrets in text files. Requires libmagic!
Mostly all stolen from Trufflehog regexes:
- https://github.com/dxa4481/truffleHogRegexes/blob/master/truffleHogRegexes/regexes.json
*/
import "magic"
@sathwikv143
sathwikv143 / sec_news.opml
Last active November 11, 2024 20:45
Cyber Sec News Feeds
<?xml version="1.0" encoding="UTF-8"?>
<opml version="2.0">
<head>
<title>MyFeed</title>
</head>
<body>
<outline title="Blogs" text="Blogs">
<outline title="The Cloudflare Blog" type="rss" xmlUrl="https://blog.cloudflare.com/rss/" text="The Cloudflare Blog" htmlUrl="https://blog.cloudflare.com/" />
<outline xmlUrl="https://www.rossmanngroup.com/feed/" title="Rossmann Repair Group" text="Rossmann Repair Group" type="rss" htmlUrl="https://rossmanngroup.com" />
<outline text="Google Online Security Blog" type="rss" htmlUrl="http://security.googleblog.com/" xmlUrl="https://security.googleblog.com/feeds/posts/default?alt=rss" title="Google Online Security Blog" />
@namishelex01
namishelex01 / Security Engineer - Interview Questions.md
Last active September 15, 2024 11:34
Cyber security engineer, Security Engineer, Security Analyst, Information Security Analyst and many more names

Core Information Security

  • What is information security and how is it achieved?

  • What are the core principles of information security?

  • What is the CIA triangle?

  • What is non-repudiation (as it applies to IT security)?

@lokori
lokori / supergobuster.sh
Last active July 1, 2022 20:29
gobuster enumerator for hack-the-box machines. This generates huge amount of useless requests..
#!/bin/bash
set -eu
URL=$1
echo "super go bustering for super brute: $URL"
gobuster -u $URL -l -s 200,204,301,302,307,403 -w /root/tools/SecLists/Discovery/Web_Content/tomcat.txt
gobuster -u $URL -l -s 200,204,301,302,307,403 -w /root/tools/SecLists/Discovery/Web_Content/nginx.txt
gobuster -u $URL -l -s 200,204,301,302,307,403 -w /root/tools/SecLists/Discovery/Web_Content/apache.txt
@tuxfight3r
tuxfight3r / tcp_flags.txt
Last active October 31, 2024 00:32
tcpdump - reading tcp flags
##TCP FLAGS##
Unskilled Attackers Pester Real Security Folks
==============================================
TCPDUMP FLAGS
Unskilled = URG = (Not Displayed in Flag Field, Displayed elsewhere)
Attackers = ACK = (Not Displayed in Flag Field, Displayed elsewhere)
Pester = PSH = [P] (Push Data)
Real = RST = [R] (Reset Connection)
Security = SYN = [S] (Start Connection)