Objective:
- Build a simple web application that allows an admin to manage a network of agents.
- The admin should be able to add, update, view, and delete agents in the network.
# Requires PowerShell to be run as Administrator | |
#Requires -RunAsAdministrator | |
# Function to check if TightVNC is installed | |
function Test-TightVNCInstalled { | |
$installed = Get-ItemProperty HKLM:\Software\Microsoft\Windows\CurrentVersion\Uninstall\* | | |
Where-Object { $_.DisplayName -like "*TightVNC*" } | |
return $null -ne $installed | |
} |
#!/bin/bash | |
# Check if running on macOS | |
if [ "$(uname)" != "Darwin" ]; then | |
echo "This script is for macOS only" | |
exit 1 | |
fi | |
# Check if running as root | |
if [ "$EUID" -eq 0 ]; then |
// manifest.json | |
{ | |
"name": "Local Agent Connector", | |
"version": "1.0", | |
"manifest_version": 3, | |
"permissions": [ | |
"nativeMessaging", | |
"tabs" | |
], | |
"background": { |
// DriveByProtector.js | |
class DriveByProtector { | |
constructor() { | |
this.suspiciousPatterns = { | |
fileTypes: /\.(exe|msi|dmg|pkg|deb|bat|cmd|sh|ps1|vbs|jar|dll|scr)$/i, | |
mimeTypes: [ | |
'application/x-msdownload', | |
'application/x-msdos-program', | |
'application/x-executable', | |
'application/x-dosexec', |
// manifest.json | |
{ | |
"manifest_version": 3, | |
"name": "Redirect Detective", | |
"version": "1.0", | |
"description": "Detects and analyzes potentially malicious redirects", | |
"permissions": [ | |
"webNavigation", | |
"webRequest", | |
"storage", |