This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# -*- coding: utf-8 -*- | |
# | |
# Microsoft GraphAPI | |
# ------------------ | |
# Get Azure Ad Users and Sentinel Incidents | |
# | |
# v0.1 - (C) 2024 by suuhm | |
# |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# | |
# UDP PUNCH-OUT! UDP-HOLE PUNCHING | |
# --------------------------------- | |
# | |
# local send: From: 1.1.1.1:13337 -> remote-ip:RANDOM | |
# remote send: From: remote-ip:RANDOM -> 1.1.1.1:13337 | |
# | |
_use_udp_hp() |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# | |
# "=========================" | |
# "FTP Directory Downloader " | |
# " ----------------------- " | |
# " Xtrtact & AV scanning " | |
# " ----------------------- " | |
# " (c) 2024 by suuhmer " | |
# "=========================" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Requires the Active Directory module | |
Import-Module ActiveDirectory | |
Write-Host "************************************" | |
Write-Host "* Get Active Directory Information *" | |
Write-Host "* (C) 204 By suuhmer *" | |
Write-Host "************************************" | |
Write-Host "" | |
# List users |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@echo off | |
echo Get CBS.logs (sfc /scannow) | |
echo\ | |
set "logPath=C:\Windows\Logs\CBS\CBS.log" | |
set "searchString=Failed to pin deployment while resolving Update" | |
for /f "tokens=*" %%a in ('findstr /c:"%searchString%" "%logPath%"') do ( | |
set "errorLine=%%a" | |
) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@echo off | |
SETLOCAL ENABLEEXTENSIONS | |
REM 424_tunnel script (c) 2024 suuhm | |
REM netsh interface ipv4 set interface "Ethernet" forwarding=enabled | |
REM netsh interface portproxy add v4tov4 listenaddress=lokal_IP listenport=9999 connectaddress=target_IP connectport=80 | |
REM netsh interface portproxy show all | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# hashes only: | |
#grep -Eo "\b[a-f0-9]{32}\b" hashes.txt > md5-hashes.txt | |
# Mails:Hashes extract from your textfile: | |
sed -nE "s/.*'([a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,})'.*'([a-f0-9]{32})'.*/\1:\2/p" your_text_file.txt > mail-md5.txt | |
# Crack hashes with usernames: | |
hashcat -a0 -m0 --username --potfile-path mail_md5.potfile mail-md5.txt /usr/share/wordlists/rockyou.txt.gz |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@echo off | |
SET mypath=%~dp0 | |
echo %mypath:~0,-1% | |
pushd %~dp0 | |
echo\ | |
REM popd | |
REM !!! YOU NEED PSEXEC !!! | |
REM DOWNLOAD zip package incl psexec: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# PIP / VIRTUALENV | |
# ---------------- | |
python -m pip install --upgrade pip || \ | |
# | |
apt update && \ | |
apt install python-pip python3-pip python3-virtualenv | |
# OLD: ( pip install virualenv ) | |
virtualenv [--python=python3] project-XYZ | |
cd project-XYZ ; source bin/activate | |
# |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# Setting Up OpenWRT on a Virtual Machine with Proxmox | |
# Based on: https://community.bigbeartechworld.com/t/setting-up-openwrt-on-a-virtual-machine-with-proxmox/257 | |
# Set your wished version: | |
export VER="23.05" | |
export ARCH="amd64" | |
export INDEX_URL="https://images.linuxcontainers.org/images/openwrt/$VER/$ARCH/default" | |
#export BUILDDATE=$(date -d "yesterday" '+%Y%m%d') |
NewerOlder