Skip to content

Instantly share code, notes, and snippets.

@ethack
ethack / Notes.md
Last active September 5, 2015 07:02
InstallUtility Functions
@ethack
ethack / keybase.md
Last active October 12, 2015 07:55
Keybase Identify Proof

Keybase proof

I hereby claim:

  • I am ethack on github.
  • I am ethanrobish (https://keybase.io/ethanrobish) on keybase.
  • I have a public key whose fingerprint is 5BE9 053D 9CB6 25DE 6D47 72B8 C9FA CFF9 6A94 0B7B

To claim this, I am signing this object:

@ethack
ethack / gist:72497f162fd1ef33c4dd
Last active October 12, 2015 07:58
Socks Module #python
"""SocksiPy - Python SOCKS module.
Version 1.00
Copyright 2006 Dan-Haim. All rights reserved.
Redistribution and use in source and binary forms, with or without modification,
are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this
list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice,
@ethack
ethack / reflect.py
Last active October 12, 2015 07:59 — forked from huyng/reflect.py
HTTP Reflector #python
#!/usr/bin/env python
# Reflects the requests from HTTP methods GET, POST, PUT, and DELETE
# Written by Nathan Hamiel (2010)
from BaseHTTPServer import HTTPServer, BaseHTTPRequestHandler
from optparse import OptionParser
class RequestHandler(BaseHTTPRequestHandler):
def do_GET(self):
Function Resolve-Host()
{
Param(
[Parameter(Mandatory=$true,Position=0)] $HostEntry,
[Switch] $HostnameToIP,
[Switch] $FlushDNS
)
If($FlushDNS)
{
@ethack
ethack / docker_image_ssh.sh
Created August 11, 2021 00:12
Transfer a docker image from one machine to another over SSH
#!/bin/bash
if [ $# -eq 0 ]; then
cat <<EOF
Usage: $0 <docker image> <ssh args>
<docker image> the name of the image to transfer
<ssh args> all arguments are passed through to ssh to establish the connection
EOF
exit 1
fi
@ethack
ethack / 1 readme.md
Last active September 7, 2023 19:36
Threat Hunting Tools

How to install various tools useful for threat hunting.

FWIW: I didn't produce the content presented here (the outline from Edmond Lau's book). I've just copy-pasted it from somewhere over the Internet, but I cannot remember what exactly the original source is. I was also not able to find the author's name, so I cannot give him/her the proper credits.


Effective Engineer - Notes

What's an Effective Engineer?

@ethack
ethack / nosleep.ahk
Created March 2, 2017 11:54
NoSleep
CoordMode, Mouse, Screen
MouseGetPos, CurrentX, CurrentY
Loop {
Sleep, 60000
LastX := CurrentX
LastY := CurrentY
MouseGetPos, CurrentX, CurrentY
If (CurrentX = LastX and CurrentY = LastY) {
@ethack
ethack / netkatz.cs
Last active September 7, 2023 19:40
Downloads and Executes Mimikatz In Memory From GitHub
using System;
using System.IO;
using System.Net;
using System.Text;
using System.IO.Compression;
using System.Collections.Generic;
using System.Configuration.Install;
using System.Runtime.InteropServices;