Skip to content

Instantly share code, notes, and snippets.

View WJDigby's full-sized avatar
💭
It's complicated

WJDigby

💭
It's complicated
View GitHub Profile
@WJDigby
WJDigby / wifi_measure
Last active August 29, 2015 14:13
Get average signal quality and power level from /proc/net/wireless.
#!/bin/bash
#The War Room Blog
#http://warroom.securestate.com/index.php/cya-cover-your-alfa-part-ii/
x=1 # set the variables
HIGH_QUAL=$(cat /proc/net/wireless | awk 'END { print $3 }' | sed 's/\.$//') # parse the output of /proc/net/wireless to get integers only
LOW_QUAL=$(cat /proc/net/wireless | awk 'END { print $3 }' | sed 's/\.$//')
AVG_QUAL=$(cat /proc/net/wireless | awk 'END { print $3 }' | sed 's/\.$//')
HIGH_LVL=$(cat /proc/net/wireless | awk 'END { print $4 }'| sed 's/\.$//')
LOW_LVL=$(cat /proc/net/wireless | awk 'END { print $4 }'| sed 's/\.$//')
AVG_LVL=$(cat /proc/net/wireless | awk 'END { print $4 }'| sed 's/\.$//')
<!DOCTYPE html>
<html>
<head>
<title>PHP OS Command Injection</title>
<!-- Adapted from the SecureState 2015 High School CTF http://www.mountunion.edu/information-security-challenge-slated-for-saturday -->
<!-- Originally hosted at http://warroom.securestate.com -->
</head>
<body>
<h1>MD5 Hashing</h1>
<br />
use post/windows/gather/enum_ad_computers
set FIELDS distinguishedName,dNSHostname,description,operatingSystem,operatingSystemServicePack
set FILTER (&(objectCategory=computer)(userAccountControl:1.2.840.113556.1.4.803:=8192))
run
set FILTER (&(objectCategory=computer)(operatingSystem=*server*)(!(userAccountControl:1.2.840.113556.1.4.803:=8192)))
run
set FILTER (&(objectCategory=computer)(!(operatingSystem=*server*)))
run
set FIELDS distinguishedName,name,mail,description
set FILTER (&(objectCategory=person)(objectClass=user)(!(userAccountControl:1.2.840.113556.1.4.803:=2)))
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Auxiliary
def initialize
@WJDigby
WJDigby / gist:e4245de93d0c0fc46ab025ae48e5db5a
Created August 14, 2017 12:21
NTLM Authentication password-spraying via curl
while read user; do curl --ntlm -u '"$user":PASSWORD' URI -w 'size: %{size_download}\n' -o /dev/null; done < userlist.txt
import argparse
from subprocess import call
# Useful for Bluetooth device discovery when Bluetooth device addresses may be one off from wireless MAC addresses
# See, for example, "Hacking Exposed: Wireless", 3rd edition, by Joshua Wright and Johnny Cache, pages 211-214.
# To generate the list of addresses and test using hcitool (or another command line tool):
# python3 off-by-one.py -l macs.lst | while read -r line; do hcitool name "$line"; done
def off_by_one(mac_list, flag):
@WJDigby
WJDigby / sendmail.py
Last active August 3, 2023 13:21
python3 send email via gmail API
from apiclient.discovery import build
from apiclient import errors
from httplib2 import Http
from oauth2client import file, client, tools
from email.mime.text import MIMEText
from base64 import urlsafe_b64encode
SENDER = <sender>
RECIPIENT = <recipient>
@WJDigby
WJDigby / lengthen.py
Created July 22, 2018 23:35
URL Lengthener
import requests
import argparse
def lengthen(url):
if not url.lower().startswith(("http://", "https://")):
url = "http://" + url
http_req = requests.get(url)
return http_req.url
def main():
@WJDigby
WJDigby / ip extractor
Created July 30, 2018 22:22
Extract IP addresses from a packet capture
tcpdump -r <filename>.pcap 'ip' -n | grep -E '[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}' -o | sort -u
@WJDigby
WJDigby / friendly-reverse.py
Created October 2, 2018 18:02
Make reverse DNS output of host command more friendly.
#!/usr/bin/python
'''Pipe output of host command into this script when performing reverse lookups to get a more friendly output:
while read i; do host $i | ./friendly-reverse.py; done < list.txt '''
import sys
for lookup in sys.stdin:
ip = lookup.split('.', 4)[:4]
domain = lookup.rsplit(' ', 1)[1]