Skip to content

Instantly share code, notes, and snippets.

View 0x00009b's full-sized avatar
💭
*static tv sounds*

0x00009b 0x00009b

💭
*static tv sounds*
View GitHub Profile
25 WAY TO BECOME THE ULTIMATE SCRIPT KIDDIE
1. You do not need to learn C, C++, C#, Python, Perl, PHP, Assembly and other computer programming languages since Kali, Parrot OS, and Backbox Linux have scripts and GUIs for performing penetration testing, wireless cracking, and vulnerability assessment.
2. Use r57, c100 or c99 shells as your backdoor shells as a proof that you were able to hack their web application and have gained access to the server.
3. Use the Hail Mary attack in Armitage in a covert penetration test because the GUI is awesome. It is very cool and totally legit. You don’t need to know the exploits being launched.
4. You don’t need to study exploit development or all those EIP and ESP stuffs since you can just download any exploits in Exploit-DB or Packet Storm. The Metasploit Framework has a bunch of exploits too so no worries. Some forums have exploit kits that are free to download and you should be all right with it.
5. Make unbelievable claims that you are the world’s no. 1 hacker and
@0x00009b
0x00009b / starship.toml
Created January 29, 2021 14:40 — forked from onedr0p/starship.toml
starship.toml
add_newline = true
prompt_order = ["username", "kubernetes", "directory", "git_branch", "git_status", "character"]
[character]
symbol = "\n(∩`-´)⊃ "
error_symbol = "\n(ง •̀_•́)ง "
style_success = "bold green"
use_symbol_for_status = true
[username]
+━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━+
┃ [!] WARNING [!] ┃
┃ ~ Authorized personnel only ~ ┃
┃ This is a restricted server unauthorized access is strictly prohibited. ┃
┃ Violators will be prosecuted to the fullest extent of the law. ┃
+━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━+
┃ NOTICE: Your IP will be blocked for 1 hour after six invalid login attempts. ┃
┃ If you have lost your password contact an administrator to reset it. ┃
+━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━+
server.document-root = "/home/user/light/pages/"
server.port = "8080"
server.bind = "127.0.0.1"
server.username = "user"
server.groupname = "www"
accesslog.filename = "/home/user/light/logs/access"
server.errorlog = "/home/user/light/logs/error"
server.modules = (
"mod_redirect",
[Unit]
Description=Remote desktop service (VNC)
After=syslog.target network.target
[Service]
Type=forking
User=enp
# Clean any existing files in /tmp/.X11-unix environment
ExecStartPre=/bin/sh -c '/usr/bin/Xvnc -kill %i > /dev/null 2>&1 || :'
terminal = 'st' -- can be app in path, or full path e.g. /usr/bin/xterm
editor = "vim"
@0x00009b
0x00009b / vncserver@:1.service
Created March 16, 2021 21:23 — forked from spinxz/vncserver@:1.service
systemd service file for running a vncserver (e.g. tightvncserver)
# Vncserver service file for Debian or Ubuntu with systemd
#
# Install vncserver and tools
# e.g. apt-get install tightvncserver autocutsel gksu
#
# 1. Copy this file to /etc/systemd/system/vncserver@:1.service
# 2. Edit User=
# e.g "User=paul"
# 3. Edit the vncserver parameters appropriately in the ExecStart= line!
# e.g. the -localhost option only allows connections from localhost (or via ssh tunnels)
1. Disallow root from connecting via ssh.
2. Setup firejail or other firewall to block external connection after 6 invalid login attempts from the origin.
3. setup clamAV antivirus system.
3. Switch to hardend LTS kernel.
4. disallow non privleged users rwx access to /boot
5. uninstall all non necessary software/packages
@0x00009b
0x00009b / .bashrc
Last active March 12, 2021 13:02
a super nice .bashrc
#!/bin/bash
#enp's epic .bashrc
#feel free to copy and edit just pls keep this and the above comments :p
#If not running interactively, don't do anything
case $- in
*i*) ;;
*) return;;
esac