Skip to content

Instantly share code, notes, and snippets.

View 1mm0rt41PC's full-sized avatar

1mm0rt41PC 1mm0rt41PC

View GitHub Profile
@1mm0rt41PC
1mm0rt41PC / tailscale_install.ps1
Last active November 11, 2024 14:44
This script allows Tailscale install even in a hardened context where WPAD service is disabled
sc.exe stop tailscale
killall /f /im tailscale.exe
killall /f /im tailscale-ipn.exe
killall /f /im tailscaled.exe
sc.exe delete tailscale
rm -Force -Recurse -ErrorAction SilentlyContinue "C:\Program Files\Tailscale"
$l=curl.exe -k -L https://pkgs.tailscale.com/stable/ | out-string | Select-String -Pattern '"tailscale-setup-([0-9\.]+)-amd64.msi"'
$version = $l.Matches[0].Groups[1].Value
$l=curl.exe -k -L https://pkgs.tailscale.com/stable/ 2>$null | out-string | Select-String -Pattern '"tailscale-setup-([0-9\.]+)-amd64.msi"'
$version = $l.Matches[0].Groups[1].Value
$output="C:\Windows\Temp"
rm -Force -ErrorAction SilentlyContinue "$output\tailscale*.*"
curl.exe -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36" -L https://pkgs.tailscale.com/stable/tailscale-setup-${version}-amd64.msi --output $output\tailscale-setup-latest.msi 2>$null
msiexec.exe /a "$output\tailscale-setup-latest.msi" /qb 'TARGETDIR="$output"' /quiet
ping -n 10 127.0.0.1
rm -Force -ErrorAction SilentlyContinue "$output\tailscale-setup-latest.msi"
cat <<'EOD' | docker run -i --rm -v ./:/code rust:slim-buster bash
apt-get update && apt-get install -y curl gcc clang libclang-dev libgssapi-krb5-2 libkrb5-dev libsasl2-modules-gssapi-mit musl-tools gcc-mingw-w64-x86-64
curl https://sh.rustup.rs -sSf | sh -s -- -y
source "/usr/local/cargo/env"
cd /code
export targetbuild='x86_64-unknown-linux-gnu';
echo '##########################################################################'
echo -e "\033[34m$targetbuild\033[0m"
rustup install stable-$targetbuild --force-non-host
@1mm0rt41PC
1mm0rt41PC / hexdump.py
Last active October 12, 2023 09:02 — forked from 7h3rAm/hexdump.py
hexdump with full support for python2.x and python 3.x
def hexdump( src, length=16, sep='.' ):
'''
@brief Return {src} in hex dump.
@param[in] length {Int} Nb Bytes by row.
@param[in] sep {Char} For the text part, {sep} will be used for non ASCII char.
@return {Str} The hexdump
@note Full support for python2 and python3 !
'''
result = [];
@1mm0rt41PC
1mm0rt41PC / wifi-relay.sh
Last active July 22, 2023 15:21
Wifi easy PEAP relay
#!/bin/bash
# Wifi easy PEAP relay
#
# Author: 1mm0rt41PC - immortal-pc.info - https://github.com/1mm0rt41PC
#
# Ref:
# - https://github.com/sensepost/hostapd-mana
# - https://github.com/sensepost/wpa_sycophant
# - https://sensepost.com/blog/2019/peap-relay-attacks-with-wpa_sycophant/
# - https://www.youtube.com/watch?v=eYsGyvGxlpI&feature=youtu.be&t=1052
@1mm0rt41PC
1mm0rt41PC / userDefineLang_Cypher_dark.xml
Last active May 23, 2023 14:28 — forked from cbonesana/userDefineLang_Cypher_dark.xml
A Cypher syntax highlighter for Notepad ++ with colors for a dark theme.
<NotepadPlus>
<UserLang name="Cypher" ext="cypher" udlVersion="2.1">
<Settings>
<Global caseIgnored="yes" allowFoldOfComments="yes" foldCompact="no" forcePureLC="0" decimalSeparator="0" />
<Prefix Keywords1="no" Keywords2="no" Keywords3="no" Keywords4="no" Keywords5="no" Keywords6="no" Keywords7="no" Keywords8="no" />
</Settings>
<KeywordLists>
<Keywords name="Comments">00// 01 02 03// 04</Keywords>
<Keywords name="Numbers, prefix1"></Keywords>
<Keywords name="Numbers, prefix2"></Keywords>
$tests = @'
{
"RDP server configuration": {
"Hive": {
"HKLM\\SOFTWARE\\Policies\\Microsoft\\Windows NT\\Terminal Services": {
"KeepAliveInterval": "DWord:1",
"DeleteTempDirsOnExit": "DWord:1",
"SecurityLayer": "DWord:2",
"UserAuthentication": "DWord:1",
@1mm0rt41PC
1mm0rt41PC / DeployOffice2019.ps1
Last active January 25, 2023 22:11
DeployOffice2019
# iwr https://gist.githubusercontent.com/1mm0rt41PC/6c5f758f7010561450ce48ae389be5f3/raw/DeployOffice2019.ps1 | out-string | iex
#choco.exe install -y office2019proplus --params "/Language:fr-FR"
function install_office2019( $key ){
$url = 'https://download.microsoft.com/download/2/7/A/27AF1BE6-DD20-4CB4-B154-EBAB8A7D4A7E/officedeploymenttool_15928-20216.exe'
$checksum = '12B4CF116CA332C59BABC9A99EF6505BB659EA7623E6F1A71AF04F47A772A8DB'
$conf = @'
<Configuration>
<Add OfficeClientEdition="64" Channel="PerpetualVL2019" AllowCdnFallback="True">
// start with:
// frida -U -l pinning.js -f [APP_ID] --no-pause
Java.perform(function () {
console.log('')
console.log('===')
console.log('* Injecting hooks into common certificate pinning methods *')
console.log('===')
var X509TrustManager = Java.use('javax.net.ssl.X509TrustManager');
@1mm0rt41PC
1mm0rt41PC / New-GPOSchTask.ps1
Last active November 23, 2022 15:10
Create ScheduledTasks in GPO via command line
function New-GPOSchTask
{
[CmdletBinding()]
Param (
[Parameter(Mandatory = $True)]
[String]
[ValidateNotNullOrEmpty()]
$TaskName,
[Parameter(Mandatory = $True)]