Skip to content

Instantly share code, notes, and snippets.

@dafthack
dafthack / azure_client_ids.txt
Created June 16, 2023 11:57
A collection of client IDs that can be used to authenticate a user, and their associated application name that shows up in Azure Sign-In logs.
00b41c95-dab0-4487-9791-b9d2c32c80f2 - Office 365 Management
04b07795-8ddb-461a-bbee-02f9e1bf7b46 - Microsoft Azure CLI
0ec893e0-5785-4de6-99da-4ed124e5296c - Office UWP PWA
18fbca16-2224-45f6-85b0-f7bf2b39b3f3 - Microsoft Docs
1950a258-227b-4e31-a9cf-717495945fc2 - Microsoft Azure PowerShell
1b3c667f-cde3-4090-b60b-3d2abd0117f0 - Windows Spotlight
1b730954-1685-4b74-9bfd-dac224a7b894 - Azure Active Directory PowerShell
1fec8e78-bce4-4aaf-ab1b-5451cc387264 - Microsoft Teams
22098786-6e16-43cc-a27d-191a01a1e3b5 - Microsoft To-Do client
268761a2-03f3-40df-8a8b-c3db24145b6b - Universal Store Native Client
@Hellisotherpeople
Hellisotherpeople / blog.md
Last active July 23, 2024 12:38
You probably don't know how to do Prompt Engineering, let me educate you.

You probably don't know how to do Prompt Engineering

(This post could also be titled "Features missing from most LLM front-ends that should exist")

Apologies for the snarky title, but there has been a huge amount of discussion around so called "Prompt Engineering" these past few months on all kinds of platforms. Much of it is coming from individuals who are peddling around an awful lot of "Prompting" and very little "Engineering".

Most of these discussions are little more than users finding that writing more creative and complicated prompts can help them solve a task that a more simple prompt was unable to help with. I claim this is not Prompt Engineering. This is not to say that crafting good prompts is not a difficult task, but it does not involve doing any kind of sophisticated modifications to general "template" of a prompt.

Others, who I think do deserve to call themselves "Prompt Engineers" (and an awful lot more than that), have been writing about and utilizing the rich new eco-system

@bf4
bf4 / download_all_lambda_functions.sh
Created February 27, 2023 15:24 — forked from nemani/download_all_lambda_functions.sh
Download All Lambda Functions
#!/bin/bash
#
# Usage:
# ./download_all.sh
# ./download_all.sh download us-east-1 my-function
# ./download_all.sh help
#
# Downloads all aws-lambda functions to a subdirectory
# Assumes you have a role that has at least read access to lambda.
# Credits to https://gist.github.com/nemani/defdde356b6678352bcd4af69b7fe529
@sagarhm
sagarhm / kodekloud_course_decks.md
Created October 2, 2022 13:47 — forked from debakarr/kodekloud_course_decks.md
Course decks for KodeKloud
@javifm86
javifm86 / vscode-default-color-theme.json
Last active July 22, 2024 08:05
Default colors used in VSCode, useful if you want to create your own theme using your color palette and want to provide similar colors to the defaults ones.
{
"name": "Default colors dark",
"type": "dark",
"colors": {
// Base colors
"focusBorder": "#007fd4",
"foreground": "#cccccc",
"widget.shadow": "#0000005c",
// "selection.background": // null
#!/bin/bash
#soure : https://github.com/felipesi/gpg-crack/blob/master/crackgpg.sh
if [ "$#" != 2 ]; then
echo "USAGE: $0 file.gpg wordlist.txt"
else
while read pass; do
@2XXE-SRA
2XXE-SRA / coldencryptor.cs
Last active December 27, 2023 15:30
poc ransomware like script. generates then encrypts files
using System;
using System.IO;
using System.Linq;
using System.Security.Cryptography;
using System.Collections.Generic;
using System.Runtime.InteropServices;
using System.Threading.Tasks;
using Microsoft.Win32;
public class Crypto
@med0x2e
med0x2e / process-hollowing.cs
Last active November 4, 2021 12:49
Process Hollowing (slightly updated to work with G2JS) - credits for the initial code go to @smgorelik and @ambray
using System;
using System.Collections.Generic;
using System.Runtime.InteropServices;
using System.Text;
namespace Hollowing
{
public class Loader
{
public static byte[] target_ = Encoding.ASCII.GetBytes("calc.exe");

Application Permissions

List of AAD available application permissions


Permission Id
AgreementAcceptance.Read.All d8e4ec18-f6c0-4620-8122-c8b1f2bf400e
Agreement.ReadWrite.All c9090d00-6101-42f0-a729-c41074260d47
@byt3bl33d3r
byt3bl33d3r / defender_update_check.cs
Last active March 6, 2021 15:58
Uses the Windows Update Agent API (WUA API) COM Object to check if there are definition updates available for Windows Defender
// Add a reference to "WUAPI 2.0 Type Library" in Visual Studio
// References:
// - https://github.com/xonv/nagios-net-client/blob/0920114874ecc85fc7ab3a4426e547c9dc63a44a/NscaWinUpdateModule/WindowsUpdate.cs
// - https://docs.microsoft.com/en-us/windows/win32/wua_sdk/portal-client
using System;
using WUApiLib;
namespace WinUpdateTest
{