Skip to content

Instantly share code, notes, and snippets.

View ticarpi's full-sized avatar

ticarpi ticarpi

View GitHub Profile
## nothing, reverse, case... base stuff
:
r
u
c
d
## simple number append
$0
$1
#!/usr/bin/env python3
#
# IncrementalScanner version 2.3 (14/04/2023)
# A wrapper for nmap and other Kali enumeration tools
#
# Written by Andy Tyler (@ticarpi)
# Please use responsibly...
# Software URL: https://gist.github.com/ticarpi/b1acf632bde307ba37e5a19af06901c2
# Web: https://www.ticarpi.com
# Twitter: @ticarpi
libChex has now moved to:
https://github.com/ticarpi/ticwebtools/blob/main/libChex.js
Grab it from there.
PRs for additional detections welcome :)
@echo off
REM Title: lolcheckz.cmd
REM Version: 1.1
REM Description: A script to check local policy settings on the local machine. Does not require Powershell, but does require elevation.
REM Author: Chris Hogarth
REM Created: March 2019
REM Modified: July 2021
:switchoptions
set logoutput=""
FROM python:3.8-alpine as compile
WORKDIR /opt
RUN apk add --no-cache git gcc musl-dev python3-dev libffi-dev openssl-dev cargo
ADD . /opt/impacket
WORKDIR /opt/impacket
RUN python3 -m pip install -r requirements.txt
RUN python3 setup.py install
WORKDIR /opt/impacket/examples
ENTRYPOINT ["python3"]
alert(document.domain)
{
"keys":[
{
"kty":"RSA",
"kid":"jwt_tool",
"use":"sig",
"e":"AQAB",
"n":"nj6PB6aVqg_mBhlhtx5th9W3tnmqiUZoX_Y-cOTW9YtkkRpxsQOt2vWQXNv31Wo027xrXOYA54dc-sXoYCfgWUZZ20XX9-WRRawHpT7CafKpbhFIFxMVy8ZJXqk701ihtKiOCeMopbBMi2ezCvR8L_cqfMLFACXvzV8UChNK6i1iyb7LRJbU2_U_Zw0I587NKDhq34QMKSG4ly7ibX0YpQXMEGOF8xS-JJSOdrVqPvwI7iFQP9LSzyY0f33rPoImABsrlDFIjjNYr2UVKWzzCwd_4sOMLQOdwTmFxR29754d6_qZaRd0oqTMwdCcuLE2dOGlxO7IFJcUX38_4TCvUQ"
}
]
cmd.exe /k
#!/usr/bin/env python3
############################################################
# A LibSSH RCE tool by @ticarpi #
# Cloned/carved/tweaked from multiple sources #
# This checks an SSH port to see if it's vulnerable to #
# CVE-2018-10933 #
# If it is it will prompt you for commands to run remotely #
# Usage: #
# $ python libssh_exploit_CVE-2018-10933.py <ip> <port> #