Skip to content

Instantly share code, notes, and snippets.

View co-devs's full-sized avatar
🏔️
things are happening

Mike Devens co-devs

🏔️
things are happening
View GitHub Profile
@aaronst
aaronst / unc1878_indicators.txt
Created October 28, 2020 20:20
UNC1878 Indicators
# C2 FQDNs
first seen fqdn
2019-12-11 23:37:10 updatemanagir.us
2019-12-20 17:51:05 cmdupdatewin.com
2019-12-26 18:03:27 scrservallinst.info
2020-01-10 00:33:57 winsystemupdate.com
2020-01-11 23:16:41 jomamba.best
2020-01-13 05:13:43 updatewinlsass.com
2020-01-16 11:38:53 winsysteminfo.com
2020-01-20 05:58:17 livecheckpointsrs.com
@Neo23x0
Neo23x0 / snippet_gen_yara_hash.py
Created October 10, 2020 15:51
YARA Rule Hash Used by Nextron Systems
import hashlib
import re
def calculate_rule_hash(rule):
"""
Calculates a hash over the relevant YARA rule content (string contents, sorted condition)
Requires a YARA rule object as generated by 'plyara': https://github.com/plyara/plyara
:param rule: yara rule object
:return hash: generated hash
"""
@coderholic
coderholic / ipinfo_resolv.sh
Created September 30, 2020 00:03
Bulk hostname resolution with the IPinfo.io bulk endpoint
#!/bin/bash
sed 's/$/\/hostname/' | parallel --jobs=12 --pipe -N1000 \
"curl -s -XPOST -H 'Content-Type: text/plain' --data-binary @- 'ipinfo.io/batch?token=$TOKEN&filter=1'" | \
grep '"' | sed 's|/hostname||' | cut -d'"' -f2,4 | tr '"' '\t'
@ignis-sec
ignis-sec / Microsoft.PowerShell_profile.ps1
Created September 22, 2020 15:16
My powershell profile
function Prompt
{
$FullUnicode = 'U+1F525'
$StrippedUnicode = $FullUnicode -replace 'U\+',''
$UnicodeInt = [System.Convert]::toInt32($StrippedUnicode,16)
$promptEmoji = [System.Char]::ConvertFromUtf32($UnicodeInt)
(Write-Host -NoNewline (Get-Date -Format "[HH:mm:ss]$promptEmoji"))
(Write-Host -NoNewline $env:USERNAME -ForegroundColor Red)
@r00tten
r00tten / emotet_powExtract.py
Last active October 24, 2020 04:16
To extract Powershell command and CC details from Emotet Microsoft Office Word Documents. It is using oledump.
#!/usr/bin/env python3
import re
import sys
import subprocess
import glob
import base64
import yaml
def dumpYaml(data):
@ropnop
ropnop / go-sharp-loader.go
Created August 5, 2020 17:12
Example Go file embedding multiple .NET executables
package main
/*
Example Go program with multiple .NET Binaries embedded
This requires packr (https://github.com/gobuffalo/packr) and the utility. Install with:
$ go get -u github.com/gobuffalo/packr/packr
Place all your EXEs are in a "binaries" folder
@0xtornado
0xtornado / 0_CyberChef_CobaltStrike_Shellcode_Decoder_Recipe
Created April 30, 2020 14:11
CyberChef recipe to extract and decode Shellcode from a Cobalt Strike beacon
[{"op":"Conditional Jump","args":["bxor",false,"Decode_Shellcode",10]},{"op":"Label","args":["Decode_beacon"]},{"op":"From Base64","args":["A-Za-z0-9+/=",true]},{"op":"Decode text","args":["UTF-16LE (1200)"]},{"op":"Regular expression","args":["User defined","[a-zA-Z0-9+/=]{30,}",true,true,false,false,false,false,"List matches"]},{"op":"From Base64","args":["A-Za-z0-9+/=",true]},{"op":"Gunzip","args":[]},{"op":"Label","args":["Decode_Shellcode"]},{"op":"Regular expression","args":["User defined","[a-zA-Z0-9+/=]{30,}",true,true,false,false,false,false,"List matches"]},{"op":"Conditional Jump","args":["",false,"",10]},{"op":"From Base64","args":["A-Za-z0-9+/=",true]},{"op":"XOR","args":[{"option":"Decimal","string":"35"},"Standard",false]}]
@yehgdotnet
yehgdotnet / get-shodan-favicon-hash.py
Last active April 8, 2024 18:30
Get Shodan FAVICON Hash
# https://twitter.com/brsn76945860/status/1171233054951501824
pip install mmh3
-----------------------------
# python 2
import mmh3
import requests
response = requests.get('https://cybersecurity.wtf/favicon.ico')
favicon = response.content.encode('base64')
rule XOREngine_HTTP
{
meta:
author = "smiller"
description = "This looks for brute XOR of http:// in a PE."
ref = "578cb44b784125ebd58ecb458d51b23d"
strings:
$key_01 = { 69 75 75 71 3b 2e 2e }
$key_02 = { 6a 76 76 72 38 2d 2d }
$key_03 = { 6b 77 77 73 39 2c 2c }
@mihalyr
mihalyr / forensics-cheatsheet.md
Created January 29, 2020 14:15
Linux Compromise Assessment Command Cheat Sheet