Skip to content

Instantly share code, notes, and snippets.

@IAmStoxe
IAmStoxe / typos
Created February 18, 2017 06:02 — forked from lucasdinonolte/typos
Command Line Typo Generator (node.js based)
#!/usr/bin/env node
/**
* generateTypos
* Generate Typos from keywords
*
* @param array keywords
* @param bool wrongKeys
* @param bool missedChars
* @param bool transposedChars
@IAmStoxe
IAmStoxe / shodan-google-spreadsheet.js
Created March 16, 2017 12:44 — forked from achillean/shodan-google-spreadsheet.js
Shodan macros for Google Spreadsheets. To use this go to Tools -> Script Editor, then copy/ paste the code. In the spreadsheet you can then do: =SHODAN_COUNT("cisco-ios") =SHODAN_FACET_KEYS("cisco-ios", "org") =SHODAN_FACET_VALUES("cisco-ios", "org")
var API_KEY = 'YOUR API KEY';
/**
* Search the Shodan database using the given query. Returns the number of matches.
*/
function SHODAN_COUNT(query) {
var url = 'https://api.shodan.io/shodan/host/count?key=' + API_KEY + '&query=' + query;
var response = UrlFetchApp.fetch(url);
var data = Utilities.jsonParse(response.getContentText());
<#
.Synopsis
Scans a host or network for the MS17-010 vulnerability and output results as a
table that you can pipe to other PowerShell functions such as Invoke-Command or
Export-CSV.
.DESCRIPTION
This script will use a custom NMap NSE script to scan a destination host on
port 445 for the MS17-010 vulnerability. If the host is not online or is blocking
/*
* Name: SigScanSharp
* Author: Striekcarl/GENESIS @ Unknowncheats
* Date: 14/05/2017
* Purpose: Find memory patterns, both individually or simultaneously, as fast as possible
*
* Example:
* Init:
* Process TargetProcess = Process.GetProcessesByName("TslGame")[0];
* SigScanSharp Sigscan = new SigScanSharp(TargetProcess.Handle);
@IAmStoxe
IAmStoxe / Shodan-to-Powershell.ps1
Created November 14, 2018 01:17
How to pipe Shodan CLI to a CSV object in one line.
shodan search "SEARCH_QUERY_HERE" --fields ip_str,port --color --separator "," | ConvertFrom-Csv -Delim ',' -Header IP,PORT
@IAmStoxe
IAmStoxe / firewall.sh
Created November 16, 2018 20:31
Easy UWF VPN Killswitch
#!/bin/bash
# Reset ufw and skip the confirmation
sudo ufw --force reset
# Set default to deny any incoming and all outgoing
sudo ufw default deny incoming
sudo ufw default allow outgoing
# Allow all IN/OUT traffic on our tun0 (VPN) adapter
@IAmStoxe
IAmStoxe / .bashrc
Created December 30, 2018 21:33
Universal Extract Alias
extract () {
if [ -f $1 ] ; then
case $1 in
*.tar.bz2) tar xvjf $1 ;;
*.tar.gz) tar xvzf $1 ;;
*.bz2) bunzip2 $1 ;;
*.rar) unrar x $1 ;;
*.gz) gunzip $1 ;;
*.tar) tar xvf $1 ;;
*.tbz2) tar xvjf $1 ;;
@IAmStoxe
IAmStoxe / bruteforce.py
Created November 6, 2019 19:46
Brute Force Iteration of Given Set of Characters
import itertools
min_length = 5
max_length = 10
char_set = 'abcdefghijklmnopqrstuvwxyz1234567890-'
for n in range(min_length, max_length + 1):
for xs in itertools.product(char_set, repeat=n):
chars = ''.join(xs)
print(chars)
@IAmStoxe
IAmStoxe / Get-RemoteHardDisks.ps1
Last active April 15, 2020 00:54
List Hard Disk Information on Remote Computers within a Domain
$creds = Get-Credential
$serverListPath = "C:\tmp\PhysicalHosts.txt"
Get-WmiObject win32_diskdrive -Credential $creds -Computer (Get-Content $serverListPath) |
Where-Object MediaType -eq 'Fixed hard disk media' |
Select-Object SystemName, Model, @{Name = 'Size(GB)'; Exp = { $_.Size / 1gb -as [int] } } |
Export-CSV "C:\tmp\disks.csv"
@IAmStoxe
IAmStoxe / New-CWSyncServer.ps1
Created April 15, 2020 16:58
New CW SmartSync Server
function New-CWSyncServer {
<#
.DESCRIPTION
Add SmartSync server to CaseWare Working Papers.
.PARAMETER HostName
Host name of SmartSync server.
.PARAMETER Label
Friendly name of SmartSync server as it will appear in CaseWare Working Papers.
.EXAMPLE
New-CWSyncServer site01.company.com