You can also modify and test run the scripts locally using:
cscript .\network-info.vbs| # ruby's git repo investigation zsh one-liner-ish thingy | |
| # (a starting point for investigating anomalous contributions in git repositories) | |
| echo "$(find . -type f ! -size 0 ! -path './.git*' -exec grep -IL . "{}" \;)" | \ | |
| sed -e "s/^\.\///g" | \ | |
| while read line; \ | |
| do \ | |
| echo ">>>>>>>>$line"; \ | |
| echo "$(git log --follow --find-renames=40% --pretty=format:"%ad%x0A%h%x0A%an%x20<%ae>%x0A%s" -- "$line" | head -n 4)"; \ | |
| commitdates="$(git log --follow --find-renames=40% --pretty=format:"%ae" -- "$line" | head -n 1 | xargs -I {} git log --author={} --pretty=format:"%ad")"; \ | 
| # study stream aliases | |
| # Requires https://github.com/caarlos0/timer to be installed. spd-say should ship with your distro | |
| declare -A pomo_options | |
| pomo_options["work"]="45" | |
| pomo_options["break"]="10" | |
| pomodoro () { | |
| if [ -n "$1" -a -n "${pomo_options["$1"]}" ]; then | |
| val=$1 | 
| #!/usr/bin/env bash | |
| # shellcheck disable=SC2034 | |
| # shellcheck disable=SC1091 | |
| # shellcheck disable=SC2154 | |
| # PADD | |
| # | |
| # A more advanced version of the chronometer provided with Pihole | |
| # SETS LOCALE | 
| curl -L -k -s https://www.example.com | tac | sed "s#\\\/#\/#g" | egrep -o "src['\"]?\s*[=:]\s*['\"]?[^'\"]+.js[^'\"> ]*" | awk -F '//' '{if(length($2))print "https://"$2}' | sort -fu | xargs -I '%' sh -c "curl -k -s \"%\" | sed \"s/[;}\)>]/\n/g\" | grep -Po \"(['\\\"](https?:)?[/]{1,2}[^'\\\"> ]{5,})|(\.(get|post|ajax|load)\s*\(\s*['\\\"](https?:)?[/]{1,2}[^'\\\"> ]{5,})\"" | awk -F "['\"]" '{print $2}' | sort -fu | |
| # using linkfinder | |
| function ejs() { | |
| URL=$1; | |
| curl -Lks $URL | tac | sed "s#\\\/#\/#g" | egrep -o "src['\"]?\s*[=:]\s*['\"]?[^'\"]+.js[^'\"> ]*" | sed -r "s/^src['\"]?[=:]['\"]//g" | awk -v url=$URL '{if(length($1)) if($1 ~/^http/) print $1; else if($1 ~/^\/\//) print "https:"$1; else print url"/"$1}' | sort -fu | xargs -I '%' sh -c "echo \"\n##### %\";wget --no-check-certificate --quiet \"%\"; basename \"%\" | xargs -I \"#\" sh -c 'linkfinder.py -o cli -i #'" | |
| } | |
| # with file download (the new best one): | |
| # but there is a bug if you don't provide a root url | 
| Retrieves all of the trust relationships for this domain - Does not Grab Forest Trusts | |
| ([System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()).GetAllTrustRelationships() | |
| Grab Forest Trusts. | |
| ([System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()).GetAllTrustRelationships() | |
| #!/bin/bash | |
| unifi_username=USERNAME | |
| unifi_password='PASSWORD' | |
| unifi_controller=https://EXAMPLE.COM:8443 | |
| wifi_id=YOUR_WIFI_ID | |
| cookie=/tmp/cookie | |
| curl_cmd="curl -s -S --cookie ${cookie} --cookie-jar ${cookie} --insecure " | 
| #!/usr/bin/env python | |
| """ | |
| animatronic_mouth.py | |
| This script animates a motorized mouth on a Raspberry Pi GPIO pin so that it | |
| appears to be speaking alongside the audio on the specified PulseAudio source | |
| (which usually should be a sink's monitor). | |
| Find PA_SOURCE with `pactl list` and look for a monitor device that corresponds | 
| #!/usr/bin/env python2 | |
| # Author: @ropnop (Ronnie Flathers) | |
| # Simple script to ingest a Python file (e.g. a shell) and return a oneliner command | |
| # Useful with command injection vulns | |
| # Based entirely off of Metasploit's "reverse_python.rb" payload | |
| # Credit to Brendan Coles <bcoles[at]gmail.com> | |
| # | |
| # Example: | |
| # $ python make_oneliner.py pty_shell.py | 
| echo strUrl = WScript.Arguments.Item(0) > wget.vbs | |
| echo StrFile = WScript.Arguments.Item(1) >> wget.vbs | |
| echo Const HTTPREQUEST_PROXYSETTING_DEFAULT = 0 >> wget.vbs | |
| echo Const HTTPREQUEST_PROXYSETTING_PRECONFIG = 0 >> wget.vbs | |
| echo Const HTTPREQUEST_PROXYSETTING_DIRECT = 1 >> wget.vbs | |
| echo Const HTTPREQUEST_PROXYSETTING_PROXY = 2 >> wget.vbs | |
| echo Dim http,varByteArray,strData,strBuffer,lngCounter,fs,ts >> wget.vbs | |
| echo Err.Clear >> wget.vbs | |
| echo Set http = Nothing >> wget.vbs | |
| echo Set http = CreateObject("WinHttp.WinHttpRequest.5.1") >> wget.vbs |