Skip to content

Instantly share code, notes, and snippets.

REM install WinRM and powershell
START "" /WAIT WindowsXP-KB968930-x86-ENG.exe /quiet /passive /norestart
REM disable all the shitz
set LIST=(helpsvc ERSvc FastUserSwitchingCompatibility RDSessMgr WZCSVC Dot3scv VSS Themes LmHosts srservice SSDPSRV SCardSvr wscsvc Spooler wuauserv CiSvc SwPrv)
for %%i in %LIST% do CALL sc config %%i start= disabled
REM enable DCOM auth without domain
reg add "HKLM\SYSTEM\CurrentControlSet\Control\Lsa" /v forceguest /t REG_DWORD /d 0 /f

Keybase proof

I hereby claim:

  • I am y0ug on github.
  • I am y0ug (https://keybase.io/y0ug) on keybase.
  • I have a public key whose fingerprint is 260F 136C F2B3 8151 E0E9 8E02 53DE E8FD 72F6 A9E3

To claim this, I am signing this object:

@y0ug
y0ug / cache_injector.py
Created September 21, 2014 08:42
MITM script to inject JS into files and trick with the cache
#!/usr/bin/env python
"""
sudo iptables -t nat -A PREROUTING -i wlan0 -p tcp --destination-port 80 -j REDIRECT --to-port 8080
sudo iptables -t nat -D PREROUTING -i wlan0 -p tcp --destination-port 80 -j REDIRECT --to-port 8080
"""
from libmproxy import controller, proxy, platform
from libmproxy.flow import Response
from netlib.odict import ODictCaseless
@y0ug
y0ug / evtx_dump.py
Created September 21, 2014 08:41
Dump evtx to XML
import mmap
import contextlib
import argparse
from Evtx.Evtx import FileHeader
from Evtx.Views import evtx_file_xml_view
def main():
@y0ug
y0ug / evtx_extract_usb.py
Created September 21, 2014 08:40
Extract usb connection from evtx files
#!/bin/python
import mmap
import contextlib
import argparse
from bs4 import BeautifulSoup
from Evtx.Evtx import FileHeader
from Evtx.Views import evtx_file_xml_view
@y0ug
y0ug / evtx_extract_taskscheduler.py
Created September 21, 2014 08:39
Extract task scheduler log from evtx
import mmap
import contextlib
import argparse
from bs4 import BeautifulSoup, element
from Evtx.Evtx import FileHeader
from Evtx.Views import evtx_file_xml_view
@y0ug
y0ug / evtx_extract_sys.py
Created September 21, 2014 08:38
Extract from system evtx logon
import mmap
import contextlib
import argparse
from bs4 import BeautifulSoup, element
from Evtx.Evtx import FileHeader
from Evtx.Views import evtx_file_xml_view
evtxs = {
@y0ug
y0ug / yubi_goog.py
Created September 21, 2014 08:38
Google OTP yubikey
#!/usr/bin/env python
################################################################################
# yubi_goog.py - google authenticator via yubikey
#
# Use --generate to generate OTPs given a base 32 secret key (from google)
# Use --yubi to send a challenge to the yubikey to generate OTPs
# Use --convert-secret to convert the google secret into hex
#
# author: Casey Link <[email protected]>
# https://github.com/Ramblurr/yubi-goog.git
@y0ug
y0ug / smbshare.py
Created September 21, 2014 08:36
Impacket SMB server
#!/usr/bin/env python
# -*- coding: utf-8 -*-
from impacket import smbserver
from impacket.smbconnection import *
import threading
import ConfigParser
class ThreadedSMBServer(threading.Thread):
"""
Threaded SMB server that can be spun up locally.
@y0ug
y0ug / scaparp.py
Created September 21, 2014 08:36
Scapy ARP poisoning other way
#!/usr/bin/env python
# -*- coding: utf-8 -*-
from scapy.all import *
iface = "vboxnet1"
sleep = 1
verbose = 1
def arp_poison(psrc, pdst):
pkt = ARP()