Skip to content

Instantly share code, notes, and snippets.


fen fenneh

  • London
View GitHub Profile
View Deploy-Windows-Service-Via-MSBuild.proj.xml
<Project DefaultTargets="CopyOutputs;DeployService" xmlns="" ToolsVersion="4.0">
<!-- These settings control what the service's name, description etc appear in services.msc task panel. -->
<PropertyGroup Label="ServiceMetaData">
<ServiceDisplayName>Shiny New Service</ServiceDisplayName>
<ServiceDescription>A shiny new service, that changes the world for the greater good.</ServiceDescription>
View WindowsServiceLib.psm1
Set-StrictMode -Version Latest
$libPath = (Split-Path -Parent $MyInvocation.MyCommand.Definition)
Import-Module $libPath\SecurityLib.psm1
function New-WindowsService {
[Parameter(Mandatory=$True,Position=0,HelpMessage="The name of the Windows Service")]
View PSSessions.ps1
fenneh / suckadick.json
Created Dec 27, 2013
Bypass Virgin Blocks using HTTP Referrer
View suckadick.json
View wtf.ps1
$computers = Read-Host 'List computers to run against seperated by commas'
foreach($computer in $computers){
$width = (Get-WmiObject -ComputerName $computer -Class Win32_Processor).addresswidth
If($width -eq 64) Then
{psexec \\$computer msiexec /i \\Ukpddc01\netlogon\NSClient++\NSCP- /quiet /norestart /log \\$computer\c$\NSClientInstall.log}
Else($width -eq 32) Then
{psexec \\$computer msiexec /i \\Ukpddc01\netlogon\NSClient++\NSCP- /quiet /norestart/log \\$computer\c$\NSClientInstall.log}
End If
View SecureSSL.ps1
function Set-SSLSecurityProtocols {
$protopath = "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols"
& reg.exe add "$protopath\PCT 1.0\Server" /v Enabled /t REG_DWORD /d 00000000 /f
& reg.exe add "$protopath\SSL 2.0\Server" /v Enabled /t REG_DWORD /d 00000000 /f
& reg.exe add "$protopath\SSL 3.0\Server" /v Enabled /t REG_DWORD /d 00000001 /f
& reg.exe add "$protopath\TLS 1.0\Server" /v Enabled /t REG_DWORD /d 00000001 /f
& reg.exe add "$protopath\TLS 1.1\Server" /v Enabled /t REG_DWORD /d 00000001 /f
& reg.exe add "$protopath\TLS 1.1\Server" /v DisabledByDefault /t REG_DWORD /d 00000000 /f
& reg.exe add "$protopath\TLS 1.2\Server" /v Enabled /t REG_DWORD /d 00000001 /f
& reg.exe add "$protopath\TLS 1.2\Server" /v DisabledByDefault /t REG_DWORD /d 00000000 /f
fenneh / gist:5653601
Created May 26, 2013
Dururuirururmu Rotations
View gist:5653601
/ra G1 :: Red -> Blue -> Yellow :: Esinar, Tonz, Droodz, Milf, Tatsu, Cuttle, HP
/ra G2 :: Blue -> Yellow -> Red :: Gebuz, Araven, Mew, Tarrant, Essem, Puncehh
/ra G3 :: Yellow -> Red -> Blue :: Fen, Shen, Ani, Critten, Mean, Herc, Drae
View OctoDeploy.ps1
[string] $EnvironmentName,
[string] $Version,
[string] $ProjectName,
[string] $OctopusApiKey,
[string] $OctopusServerUrl,
[string] $ReleaseNotes
fenneh / ExchangeMMC.bat
Created Nov 1, 2012
Exchange MMC & Windows 8 -Fix
View ExchangeMMC.bat
@echo off
set COMPLUS_Version=v2.0.50727
start C:\Progra~1\Microsoft\Exchan~1\V14\Bin\Exchan~1.msc
fenneh / DomainUser.Ps1
Created Aug 13, 2012
Get All users from AD
View DomainUser.Ps1
New-PSDrive -PSProvider ActiveDirectory -Name ADUser -Root "" -Server ""
pushd ADUser:
Get-ADUser -Filter * | Out-File "$env:temp\hihi.txt" -Encoding Default
You can’t perform that action at this time.