Skip to content

Instantly share code, notes, and snippets.

View Patrick-Kelley's full-sized avatar

Patrick Kelley Patrick-Kelley

View GitHub Profile
{
"title": "Traffic Eth1 BRO IDS",
"services": {
"query": {
"idQueue": [],
"list": {
"0": {
"query": "files.log",
"alias": "",
"color": "#7EB26D",
@Patrick-Kelley
Patrick-Kelley / TAP-Install.sh
Last active December 18, 2015 00:20
TAP Installation Script
echo "Beginning Installation"
apt-get update
apt-get -y upgrade
apt-get install -y vim
echo "Installing Iodine for DNS Tunnel"
apt-get -y install iodine
echo "Installing Git for Repo Downloading"
apt-get -y install git
echo "Installing TAP Prerequisites"
apt-get -y install python-pexpect
# If you want dnsmasq to listen for DHCP and DNS requests only on
# specified interfaces (and the loopback) give the name of the
# interface (eg eth0) here.
# Repeat the line for more than one interface.
interface=at0
#interface=wlan0mon
#interface=wlan0
# Uncomment this to enable the integrated DHCP server, you need
# to supply the range of addresses available for lease and optionally

Keybase proof

I hereby claim:

  • I am logikphreak on github.
  • I am pkelley (https://keybase.io/pkelley) on keybase.
  • I have a public key whose fingerprint is A16B 1865 26EC 7D2D 8769 A55E 7B9F D7BB 16EB 3469

To claim this, I am signing this object:

aircrack-ng -w 000webhost.txt,10k_most_common.txt,10_million_password_list_top_1000000.txt,500-worst-passwords.txt,adobe100.txt,alleged-gmail-passwords.txt,Ashley_Madison.txt,Basic_Spanish_List.txt,best1050.txt,bt4-password.txt,cain.txt,carders.cc.txt,common-passwords-win.txt,conficker.txt,darkc0de.txt,elitehacker.txt,english.txt,faithwriters.txt,hak5.txt,honeynet-nocount.txt,hotmail.txt,john.txt,KeyboardCombinations.txt,korelogic-password.txt,MostPopularLetterPasses.txt,myspace.txt,password-permutations.txt,passwords_youporn2012.txt,rockyou.txt,singles.org.txt,SplashData-2015.txt,Sucuri_Top_Wordpress_Passwords.txt,twitter-banned.txt,wordpress_attacks_july2014.txt
@Patrick-Kelley
Patrick-Kelley / gist:c8d67e32c504d4af67346dc576a1619b
Created June 3, 2022 17:40
CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability - Ansible - Removal Playbook
- name: Remove MS-MSDT Key
hosts: win-test
gather_facts: false
tasks:
- win_command: powershell.exe -
args:
stdin: reg export HKCR\ms-msdt c:\msdt-export.reg
- win_command: powershell.exe -
######################################################
# Bro script to parse (MS-SQL) TDS data streams and #
# extract SQL statements and TDS7 login information. #
# #
# parsetds.bro v2014.01.27 #
# https://malwaremusings.com/scripts/parsetds.bro #
# #
# usage: #
# Place the script in $BRO_HOME/share/bro/site #
# and either load it from local.bro with #
# Python script to convert subnets to lists of IP
# Prompt the user to input a subnet in CIDR notation
subnet = input("Enter the subnet in CIDR notation (e.g. 192.168.1.0/24): ")
# Split the subnet into IP address and CIDR mask
ip_addr, cidr = subnet.split("/")
cidr = int(cidr)
# Calculate the netmask
netmask = (0xffffffff << (32 - cidr)) & 0xffffffff
import subprocess
def run_nmap(cidr_block, output_file):
command = f"nmap -A -oX {output_file} {cidr_block}"
try:
subprocess.check_call(command, shell=True)
print(f"Nmap scan results saved to: {output_file}")
except subprocess.CalledProcessError as e:
print(f"Error executing Nmap command: {e}")
@Patrick-Kelley
Patrick-Kelley / findransomwarefiles.ps1
Created June 30, 2023 16:31
Potential candidate for quickly locating encrypted files using the CPS wordlist.
$drive = "C:\"
$days = 7 # Number of days to consider as "recent"
# Download the wordlist file
$wordlistUrl = "https://raw.githubusercontent.com/CriticalPathSecurity/Zeek-Intelligence-File-Names/main/Zeek-Intelligence-File-Names.txt"
$wordlistPath = "$env:TEMP\Zeek-Intelligence-File-Names.txt"
Invoke-WebRequest -Uri $wordlistUrl -OutFile $wordlistPath
# Read the wordlist file into an array
$wordlist = Get-Content -Path $wordlistPath