Skip to content

Instantly share code, notes, and snippets.

View adde88's full-sized avatar
🎯
Focusing

Andreas Nilsen adde88

🎯
Focusing
View GitHub Profile
@adde88
adde88 / mount-disks.sh
Last active July 1, 2024 02:20
mount-listed-partitions.sh
#!/usr/bin/env bash
#
# Written by: Andreas Nilsen - <adde88@gmail.com>
#
# This script is custom made to mount my drives, USB drives, and SWAP to their correct directory, due to issues with fstab and systemctl on my system.
# it will attempt to detect any drives that are already mounted correctly and uncorrectly, and then behave accordingly
# it will attempt to fix any NTFS partitions by using 'ntfsfix' on them before mounting them.
# it is meant to be run as a cronjob every minutes, and will ONLY do anything IF it detects that a drive is NOT mounted correctly.
#
# Latest update: 28.June.2024
@Gavin0x0
Gavin0x0 / chatgpt-chat-snapshot.js
Last active February 20, 2023 19:37
Adds a button to ChatGPT to take a screenshot of the conversation
// ==UserScript==
// @name Chat Snapshot
// @namespace ChatGPT_Plugin
// @version 1
// @author Gavin
// @description Adds a button to ChatGPT to take a screenshot of the conversation
// @match https://chat.openai.com/*
// @grant GM_download
// @require https://cdnjs.cloudflare.com/ajax/libs/html2canvas/1.4.0/html2canvas.min.js
// ==/UserScript==
@adde88
adde88 / .openwrt_aliases
Last active March 19, 2023 17:22
My private OpenWRT (SDK) Build Helper Scripts, for easy building of packages on my Kali/Debian/Arch distros.
#!/bin/bash
# DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE# Version 2, December 2004
# Copyright (C) 2023 Andreas Nilsen <adde88@gmail.com>
#
# Everyone is permitted to copy and distribute verbatim or modified
# copies of this license document, and changing it is allowed as long
# as the name is changed.
#
# DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE
# TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
@axsddlr
axsddlr / clip_interrogator.py
Created January 29, 2023 20:30
clip-interrogator
# CLIP Interrogator 2.2 by [@pharmapsychotic](https://twitter.com/pharmapsychotic)
#
# Want to figure out what a good prompt might be to create new images like an existing one? The CLIP Interrogator is here to get you answers!
#
# <br>
#
# For Stable Diffusion 1.X choose the **ViT-L** model and for Stable Diffusion 2.0+ choose the **ViT-H** CLIP Model.
#
# This version is specialized for producing nice prompts for use with Stable Diffusion and achieves higher alignment between generated text prompt and source image. You can try out the old [version 1](https://colab.research.google.com/github/pharmapsychotic/clip-interrogator/blob/v1/clip_interrogator.ipynb) to see how different CLIP models ranks terms.
#
Windows Registry Editor Version 5.00
;--------
;-------- Remove Paint 3D Edit from context menu for image files
;--------
[-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SystemFileAssociations\.bmp\Shell\3D Edit]
[-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SystemFileAssociations\.jpeg\Shell\3D Edit]
[-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SystemFileAssociations\.jpe\Shell\3D Edit]
[-HKEY_LOCAL_MACHINE\SOFTWARE\Classes\SystemFileAssociations\.jpg\Shell\3D Edit]
@mattifestation
mattifestation / HowToDetectTechniqueX_Demos.ps1
Created September 6, 2019 22:03
Demo code from my DerbyCon talk: "How do I detect technique X in Windows?" Applied Methodology to Definitively Answer this Question
#region Attack validations
wmic /node:169.254.37.139 /user:Administrator /password:badpassword process call create notepad.exe
Invoke-WmiMethod -ComputerName 169.254.37.139 -Credential Administrator -Class Win32_Process -Name Create -ArgumentList notepad.exe
$CimSession = New-CimSession -ComputerName 169.254.37.139 -Credential Administrator
Invoke-CimMethod -CimSession $CimSession -ClassName Win32_Process -MethodName Create -Arguments @{ CommandLine = 'notepad.exe' }
$CimSession | Remove-CimSession
winrm --% invoke Create wmicimv2/Win32_Process @{CommandLine="notepad.exe"} -remote:169.254.37.139 -username:Administrator -password:badpassword
@cablethief
cablethief / extract_EAP.sh
Last active February 25, 2024 15:56 — forked from singe/create_certs.sh
A simple tshark EAP certificate extractor
#!/bin/sh
# Simple tshark WiFi EAP certificate extractor
# By dominic@sensepost.com
# All rights reserved 2018
if [ ! -x $(which tshark) ]; then
echo "tshark not installed"
exit 0
fi
@mgeeky
mgeeky / sqlmap-tamper-scripts-evaluation.md
Last active May 17, 2024 12:20
SQLMap Tamper scripts evaluation against F5 Big-IP ASM WAF

SQLMap Tamper scripts evaluation against F5 Big-IP ASM WAF

The below table represents results of tests launched against F5 Big-IP ASM WAF appliance in it's XX version of YY and ZZ version of XY

Below names are to be passed to the --tamper= parameter of sqlmap.

The column Violation Rating represents most dominant rating of topmost 20 Requests observed by F5 in it's Security>>Event Logs:Application:Requests view.

The scale is 0-5.

@ECHO OFF
COLOR 1F
SET V=1.7
TITLE Windows 10 Registry tweaks for mining (x64) by: jsanzsp
ECHO #########################################################
ECHO # #
ECHO # WINDOWS 10 BUILD 10240 X64 #
ECHO # #
ECHO # #
ECHO # AUTOR: jsanzsp Ethereum Community Forum #
@hfiref0x
hfiref0x / inject.c
Last active May 31, 2023 16:23
Process Doppelgänging
//
// Ref = src
// https://www.blackhat.com/docs/eu-17/materials/eu-17-Liberman-Lost-In-Transaction-Process-Doppelganging.pdf
//
// Credits:
// Vyacheslav Rusakov @swwwolf
// Tom Bonner @thomas_bonner
//
#include <Windows.h>