Note: I did not author this, i found it somehwere.
- Tools
- Most common paths to AD compromise
- [GPO - Pivoting with Local Admin
Add-Type -OutputAssembly hello.exe -TypeDefinition @' | |
using System; | |
public class Hello { | |
public static void Main(string[] Args) { | |
System.Console.WriteLine("Hello, world!"); | |
System.Console.Read(); | |
} | |
} | |
'@ |
Note: I did not author this, i found it somehwere.
# This is kind-of based off of this: http://stackoverflow.com/questions/5974595/download-all-the-linksrelated-documents-on-a-webpage-using-python | |
import cookielib | |
import urllib2 | |
import mechanize | |
from time import sleep | |
import os | |
import cgi | |
# A routine to download a file from a link, by simulating a click on it |
import urllib.request | |
import urllib.response | |
userName = "user" | |
passWord = "password" | |
top_level_url = "http://127.0.0.1/api/update" | |
# create an authorization handler | |
p = urllib.request.HTTPPasswordMgrWithDefaultRealm() | |
p.add_password(None, top_level_url, userName, passWord); |
#!/usr/bin/env ruby | |
# apk_backdoor.rb | |
# This script is a POC for injecting metasploit payloads on | |
# arbitrary APKs. | |
# Authored by timwr, Jack64 | |
# | |
require 'nokogiri' | |
require 'fileutils' |
Directly from CLI
alias x='exit'
funcsave x
or create a file in
~/.config/fish/functions
with name
#!/usr/bin/env python | |
# | |
# I tested by Python 3.4.3 on Windows 8.1 | |
# Python 3.4.3 (v3.4.3:9b73f1c3e601, Feb 24 2015, 22:43:06) [MSC v.1600 32 bit (Intel)] on win32 | |
import urllib.request | |
import getpass | |
# If you access to url below via Proxy, | |
# set environment variable 'http_proxy' before execute this. |
public static void addTests(ClassLoader loader, TestSuite suite) { | |
try { | |
Class[] classes = getClasses("ru.mail.mailbox.cmd.server", loader); | |
System.out.println("class size " + classes.length); | |
for(Class clazz : classes) { | |
for(Method method : clazz.getDeclaredMethods()) { | |
for(Annotation annotation : method.getAnnotations()) { | |
if(annotation instanceof MockMethod) { | |
// suite.addTest(TestSuite.createTest(clazz, method.getName())); | |
System.out.println("add method " + method.getName() + " for class " + clazz.getName()); |
#!/usr/bin/env python | |
# | |
# tested by Python 3.4.3 on Windows 8.1 | |
# Python 3.4.3 (v3.4.3:9b73f1c3e601, Feb 24 2015, 22:43:06) [MSC v.1600 32 bit (Intel)] on win32 | |
# If you need to access web site/service via proxy, set http_proxy or https_proxy. | |
# https://docs.python.org/3/library/urllib.request.html#urllib.request.ProxyHandler | |
# set http_proxy=http://127.0.0.1:8888/ | |
# set https_proxy=https://127.0.0.1:8888/ |