Skip to content

Instantly share code, notes, and snippets.

@bigoals365
bigoals365 / gist:9452516f112379407cd1
Created January 27, 2015 21:33
Update Flash / Adobe for Zero Day Bugs
# Update-Flash.ps1
# This script will find your latest Flash/Adobe ActiveX EXE and run it to find updates like for the Zero Day bugs
# Adobe Begins Auto-Update Patching of Second Flash Player Zero Day
# Pasted from <http://threatpost.com/adobe-begins-auto-update-patching-of-second-flash-player-zero-day/110640>
$name = gci C:\Windows\System32\Macromed\Flash\FlashUtil64*ActiveX.exe | Sort Name -Descending | select name -First 1
@bigoals365
bigoals365 / find_suspect_kbs_output.txt
Created August 16, 2014 18:18
Output from the Find Suspect KBs PowerShell script
date message
---- -------
8/13/2014 10:26:15 PM Installation Successful: Windows successfully installed the following update: Security Update for Windows 8.1 for x64-based Systems (KB2982791)
@bigoals365
bigoals365 / find_suspect_kbs.ps1
Created August 16, 2014 18:14
Discovery if your Computer has any or all of the KBs that Microsoft is warning about
# find_suspect_kbs.ps1
# MS14-045: Description of the security update for kernel-mode drivers: August 12, 2014
# http://support.microsoft.com/kb/2982791
#
# http://blogs.technet.com/b/heyscriptingguy/archive/2011/08/22/use-powershell-to-easily-find-information-about-hotfixes.aspx
gwmi -cl win32_reliabilityRecords -filter "sourcename = 'Microsoft-Windows-WindowsUpdateClient'" |
where { $_.message -match 'KB2982791' -OR $_.message -Match 'KB2970228' -OR $_.message -Match 'KB2975719' -OR $_.message -Match 'KB2975331'} |
@bigoals365
bigoals365 / create_vm_vs14ctp2.ps1
Created August 8, 2014 21:26
Deploy Visual Studio "14" CTP 2 into an Azure VM
# create_vm_vs14ctp2.ps1
[string]$service_name = "MyVS14CTP2"
[string]$label_name = "vs14ctp2"
[string]$user_name = "vsAdmin"
[string]$password = "#Preview14$"