Skip to content

Instantly share code, notes, and snippets.

View thau0x01's full-sized avatar

thau0x01 thau0x01

View GitHub Profile
@codeguy
codeguy / slugify.js
Created September 24, 2013 13:19
Create slug from string in Javascript
function string_to_slug (str) {
str = str.replace(/^\s+|\s+$/g, ''); // trim
str = str.toLowerCase();
// remove accents, swap ñ for n, etc
var from = "àáäâèéëêìíïîòóöôùúüûñç·/_,:;";
var to = "aaaaeeeeiiiioooouuuunc------";
for (var i=0, l=from.length ; i<l ; i++) {
str = str.replace(new RegExp(from.charAt(i), 'g'), to.charAt(i));
}
generatePagesArray: function(currentPage, collectionLength, rowsPerPage, paginationRange)
{
var pages = [];
var totalPages = Math.ceil(collectionLength / rowsPerPage);
var halfWay = Math.ceil(paginationRange / 2);
var position;
if (currentPage <= halfWay) {
position = 'start';
} else if (totalPages - halfWay < currentPage) {
@teixeira0xfffff
teixeira0xfffff / MSAcpi_ThermalZoneTemperature.ps1
Created June 18, 2019 05:36
Anti-VM Techniques with MSAcpi_ThermalZoneTemperature
function Get-AntiVMwithTemperature {
$t = Get-WmiObject MSAcpi_ThermalZoneTemperature -Namespace "root/wmi"
$valorTempKelvin = $t.CurrentTemperature / 10
$valorTempCelsius = $valorTempKelvin - 273.15
$valorTempFahrenheit = (9/5) * $valorTempCelsius + 32
return $valorTempCelsius.ToString() + " C : " + $valorTempFahrenheit.ToString() + " F : " + $valorTempKelvin + "K"
}

TLDR

Cisco Security Manager is an enterprise-class security management application that provides insight into and control of Cisco security and network devices. Cisco Security Manager offers comprehensive security management (configuration and event management) across a wide range of Cisco security appliances, including Cisco ASA Adaptive Security Appliances, Cisco IPS Series Sensor Appliances, Cisco Integrated Services Routers (ISRs), Cisco Firewall Services Modules (FWSMs), Cisco Catalyst, Cisco Switches and many more. Cisco Security Manager allows you to manage networks of all sizes efficiently-from small networks to large networks consisting of hundreds of devices.

Several pre-auth vulnerabilities were submitted to Cisco on 2020-07-13 and (according to Cisco) patched in version 4.22 on 2020-11-10. Release notes didn't state anything about the vulnerabilities, security advisories were not published. All payload are processed in the context of NT AUTHORITY\SYSTEM.

<?xml version="1.0" encoding="UTF-8"?>
<mxfile host="app.diagrams.net" modified="2021-04-05T13:58:33.257Z" agent="5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36" etag="rTaCenesXKr0aODboHCg" version="14.5.7" type="google"><diagram id="AzKVqMgGisu1h7Vn0f4Q" name="Page-1">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
@n1snt
n1snt / Oh my ZSH with zsh-autosuggestions zsh-syntax-highlighting zsh-fast-syntax-highlighting and zsh-autocomplete.md
Last active April 21, 2025 11:17
Oh my ZSH with zsh-autosuggestions zsh-syntax-highlighting zsh-fast-syntax-highlighting and zsh-autocomplete.md

Oh my zsh.

Oh My Zsh

Install ZSH.

sudo apt install zsh-autosuggestions zsh-syntax-highlighting zsh

Install Oh my ZSH.

@tothi
tothi / krbrelay_privesc_howto.md
Last active December 12, 2024 13:24
Privilege Escalation using KrbRelay and RBCD

KrbRelay with RBCD Privilege Escalation HOWTO

Short HOWTO about one use case of the work from Cube0x0 (KrbRelay) and others.

TL;DR

No-Fix Local Privilege Escalation from low-priviliged domain user to local system on domain-joined computers.

Prerequisites:

  • LDAP signing not required on Domain Controller (default!)
@teixeira0xfffff
teixeira0xfffff / search_engines.csv
Last active March 1, 2024 20:51
Cybersecurity search engines for researchers [source https://twitter.com/danielmakelley/status/1570910911078207488]
Name URL Description
Dehashed https://www.dehashed.com/ View leaked credentials
SecurityTrails https://securitytrails.com/ Extensive DNS data
DorkSearch—Really https://dorksearch.com/ Really fast Google dorking
ExploitDB https://www.exploit-db.com/ Archive of various exploits
ZoomEye https://www.zoomeye.org/project?id=firewall Gather information about targets
Pulsedive—Search https://pulsedive.com/ Search for threat intelligence
GrayHatWarefare https://buckets.grayhatwarfare.com/ Search public S3 buckets
PolySwarm https://polyswarm.io/ Scan files and URLs for threats
Fofa https://github.com/wgpsec/fofa_viewer Search for various threat intelligence
@aconite33
aconite33 / bloodhoundce_import.py
Created August 15, 2023 23:04
Import large files into BloodHound CE Edition
import requests
import json
import time
import argparse
import getpass
import os
import sys
def main():