Note: I did not author this, i found it somehwere.
- Tools
- Most common paths to AD compromise
- [GPO - Pivoting with Local Admin
# 20240215 | |
# shyft | |
# script to prove my wife wrong about how much time I'm spending at my computer in the eventing. | |
# use with caution... may not be worth it to you... | |
# relies on https://github.com/ActivityWatch/activitywatch/ "Records what you do so that you can know how you've spent your time." | |
# grown from https://github.com/ActivityWatch/aw-client/blob/master/examples/time_spent_today.py | |
import sys | |
from datetime import date, datetime, time, timedelta, timezone | |
from rich import print | |
import socket |
# Options | |
set tabsize 4 | |
set tabstospaces | |
set indicator # side-bar for indicating cur position | |
set linenumbers | |
#set numbercolor green,normal | |
#set suspendable # allow nano be suspended | |
set smarthome # home jumps to line start first | |
set zap # delete selected text as a whole |
sudo ls | |
if test $(lsb_release -c | grep -o kali); then | |
echo on kali; | |
echo 'deb http://download.opensuse.org/repositories/security:/zeek/Debian_Testing/ /' |sudo tee -a /etc/apt/sources.list.d/security:zeek.list; | |
wget -nv https://download.opensuse.org/repositories/security:zeek/Debian_Testing/Release.key -O Release.key; | |
else | |
echo not on kali; | |
# For ubuntu base system rather than Debian | |
echo 'deb http://download.opensuse.org/repositories/security:/zeek/xUbuntu_21.10/ /' |sudo tee -a /etc/apt/sources.list.d/security:zeek.list; |
Note: I did not author this, i found it somehwere.
#!/usr/bin/env python | |
# Dependencies: | |
# - arrow | |
# - shodan | |
# - ImageMagick | |
# | |
# Installation: | |
# sudo easy_install arrow shodan | |
# sudo apt-get install imagemagick | |
# |
# pip3 install -U requests | |
import requests | |
import time | |
import subprocess | |
C2_SERVER = 'http://10.0.2.15:5000/' # our kali machines IP address | |
def get_ext_ip(): | |
response = requests.get('https://ifconfig.me/all.json') |
# some_bucket = "Eli" | |
# list_of_people = [ some_bucket, "Thomas Jefferson", "wallace and grommit" ] | |
# print(list_of_people) ### puts on screen | |
# list_of_servers = [ | |
# "webserver 1", | |
# "databaseserver 3", | |
# "ftp_server", |
import os | |
from time import sleep | |
# try: | |
# my_animals_file = open('other_animals.txt', 'r') | |
# for line in my_animals_file.readlines(): | |
# print(line.strip() ) | |
# my_animals_file.close()yword found in text |
vboxmanage controlvm "vm_name_here" nictrace1 on
vboxmanage controlvm "vm_name_here" nictrace1 off
A file VBox-<5_hex_digits>.pcap
will be created. don't know the significance of the digits. They don't seem to be the mac
import requests | |
import bs4 | |
# you are searching for a message that starts with 'FLAG{' and ends in '}' | |
url = 'https://leaky.shyft.us' | |
sess = requests.session() | |
ab = [chr(x) for x in range(0, 255) if chr(x).isprintable()] | |
print(ab) |