Skip to content

Instantly share code, notes, and snippets.

View elreydetoda's full-sized avatar

elreydetoda

View GitHub Profile
@elreydetoda
elreydetoda / pyenv.expect
Created February 5, 2023 05:20
small expect script for installing python version for pipenv + pyenv
#!/usr/bin/expect
set timeout 680
spawn pipenv --bare sync
expect "Y/n" { send "\r" } \
"All dependencies are now up-to-date!" { }
expect eof
@elreydetoda
elreydetoda / 00_README.md
Created December 10, 2022 09:52 — forked from FilBot3/00_README.md
Trying to use VSCode from a Flatpak using Podman-Remote to connect to Host to use DevContainers
import asyncio
loop = asyncio.get_event_loop()
async def hello():
await asyncio.sleep(3)
print('Hello!')
if __name__ == '__main__':
loop.run_until_complete(hello())
@elreydetoda
elreydetoda / get_hashcat_hash_types.py
Created June 24, 2022 13:32
python script to quickly get all the sample hashes from hashcat's website, and print them out
#!/usr/bin/env python3
# pip(env) install beautifulsoup4
from urllib.request import urlopen
from bs4 import BeautifulSoup
url = 'https://hashcat.net/wiki/doku.php?id=example_hashes'
soup = BeautifulSoup(urlopen(url).read(), features="html.parser")
pulp_default_admin_password: password
pulp_install_source: pip
pulp_settings:
secret_key: secret
content_origin: "https://{{ inventory_hostname }}"
x_pulp_api_host: 127.0.0.1
x_pulp_api_port: 24817
x_pulp_api_user: "admin"
x_pulp_api_password: "{{ pulp_default_admin_password }}"
x_pulp_api_prefix: "pulp_ansible/galaxy/automation-hub/api"
@elreydetoda
elreydetoda / ansible-navigator.yml
Created December 22, 2021 05:33
used for ansible stuff
---
# https://events.ansiblefest.redhat.com/widget/redhat/ansible21/sessioncatalog/session/1627933227788001rep4
ansible-navigator:
# ansible:
# inventories:
# - hosts
execution-environment:
container-engine: podman
@elreydetoda
elreydetoda / ModifyAndBuildingBurpExtensions.md
Last active August 18, 2021 13:53 — forked from decidedlygray/ModifyAndBuildingBurpExtensions.md
Modifying and Building Burp Extensions Quick Reference

Quick Reference

This section is a boiled down version of everything above. It should serve as an easy reference. These steps assume you've identified and installed the correct JDK.

Modify and Re-Jar Extension

  1. Locate the jar file: Extender > Extensions > Select extension > Details. bapps\ directory is located at C:\Users\yourusername\AppData\Roaming\BurpSuite\bapps
  2. Backup the original jar file to a different folder, outside of bapps.
  3. Change extension from .jar to .zip, extract contents, delete .zip file
  4. Make your modifications
  5. Re-jar: jar cvf yourJarName.jar -C extractedContentsDirectory/ .
#!/usr/bin/env python3
# inspired by Julia Evans' (https://twitter.com/b0rk) header script from
# https://changelog.fm/450 ( https://youtu.be/mFKrw_zTbpc )
import fileinput
# takes stdin from visual mode of vim and ! to execute this script
lines = [ x.strip().rstrip(' #').lstrip('# ') for x in fileinput.input() ]
# getting the longest line length from the input
@elreydetoda
elreydetoda / Disable mstsc NLA (client)
Created June 11, 2021 18:45 — forked from pingec/Disable mstsc NLA (client)
Disable NLA on remote desktop (mstsc) client (fixing password expired problem)
Sometimes you try to open a remote desktop connection to a machine only to get an error message that "the password has expired".
If the remote machine does not enforce NLA (Network Level Authentication), it is still possible to start a remote desktop session by disabling NLA on the client (currenlty not possible from the menu on my remote desktop client v.6.3.96000 that came with windows 8.1).
Add the following setting to your .rdp file ("C:\Users\<User>\Documents\Default.rdp" if you aren't using a specific one).
enablecredsspsupport:i:0
Optionally you might need to specify
@elreydetoda
elreydetoda / WinKey.ps1
Last active May 15, 2021 15:16
Get the Product key from windows
# how to use this script
# iex (new-object system.net.webclient).DownloadString("https://git.io/JsnxS")
# if that fails, it is probably something with the tls level ( took from chocolatey install )
# [System.Net.ServicePointManager]::SecurityProtocol = [System.Net.ServicePointManager]::SecurityProtocol -bor 3072
# then run the iex command again
# src: https://nedimmehic.org/2017/02/17/how-to-find-windows-product-key-allversions-of-windows/
function Get-WindowsKey {
## function to retrieve the Windows Product Key from any PC
## by Nedim Mehic
param ($targets = ".")