Skip to content

Instantly share code, notes, and snippets.

View lewisgoddard's full-sized avatar
💼
Seeking work

Lewis Goddard lewisgoddard

💼
Seeking work
View GitHub Profile
@api0cradle
api0cradle / check_vulnerabledrivers.ps1
Created May 19, 2023 14:13
A quick script to check for vulnerable drivers. Compares drivers on system with list from loldrivers.io
# Simple script to check drivers in C:\windows\system32\drivers against the loldrivers list
# Author: Oddvar Moe - @oddvar.moe
$drivers = get-childitem -Path c:\windows\system32\drivers
$web_client = new-object system.net.webclient
$loldrivers = $web_client.DownloadString(" https://www.loldrivers.io/api/drivers.json") | ConvertFrom-Json
Write-output("Checking {0} drivers in C:\windows\system32\drivers against loldrivers.io json file" -f $drivers.Count)
foreach ($lol in $loldrivers.KnownVulnerableSamples)
{
aahed
aalii
aargh
aarti
abaca
abaci
abacs
abaft
abaka
abamp
@cfreshman
cfreshman / wordle-answers-alphabetical.txt
Last active March 9, 2024 17:43
Original Wordle answers from source code in alphabetical order. And if you write a solver, here's a leaderboard! https://freshman.dev/wordle/leaderboard Additional allowed guesses: https://gist.github.com/cfreshman/cdcdf777450c5b5301e439061d29694c NYTimes version: https://gist.github.com/cfreshman/a7b776506c73284511034e63af1017ee
aback
abase
abate
abbey
abbot
abhor
abide
abled
abode
abort
import sys
import struct
import binascii
from collections import Counter
def u16(b):
return struct.unpack('<H', b)[0]
def p16(x):
return struct.pack('<H', x)
def p32(x):
@davidmhewitt
davidmhewitt / release.py
Last active April 1, 2020 20:43
Get repos in organization sorted by last release date
import datetime
from github import Github
g = Github('GET_YOUR_OWN_ACCESS_TOKEN')
class Repo:
def __init__(self, repo, release, last_release_timestamp):
self.repo = repo
self.release = release
self.last_release_timestamp = last_release_timestamp
@mkoertgen
mkoertgen / README.md
Last active July 15, 2023 02:40
Microsoft Teams Outlook AddIn Hacks

Microsoft Teams Outlook AddIn Hacks

In projects inclined to the Microsoft ecosystem, Teams is probably the best collaboration option, especially if your team members are dislocated. Probably because using different Office 365 accounts i had a hard time getting the Teams-Addin to work with Outlook. This is a know problem as you can find numerous articles on the web from people asking for help about this issue. Microsoft is working to enhance the Teams / Outlook experience.

One especially helpful article was Missing Teams Outlook Add-in by Michael LaMontagne (@RealTimeUC). Michael was the only one trying to dig deeper into the nitty-gritty details of COM-registration between Outlook and the Teams .NET application, deployed using Squirrel.Windows (as most Electron-based desktop-apps on Windows, e.g. Slack etc.).

He finally got the Teams-AddIn working by duplicating registry keys from a working machine. However, after reviewing the Teams & Teams

@JimWestergren
JimWestergren / checkPawnedPasswords.php
Last active December 22, 2023 23:06
Simple method to check the Pwned Passwords API using PHP
<?php
/**
* Simple method to use the API from https://www.troyhunt.com/ive-just-launched-pwned-passwords-version-2/
* Written by Jim Westergren and released to public domain
* @return int count
*/
function checkPawnedPasswords(string $password) : int
{
$sha1 = strtoupper(sha1($password));
$data = file_get_contents('https://api.pwnedpasswords.com/range/'.substr($sha1, 0, 5));
@mackwage
mackwage / windows_hardening.cmd
Last active April 28, 2024 20:54
Script to perform some hardening of Windows OS
:: Windows 10 Hardening Script
:: This is based mostly on my own personal research and testing. My objective is to secure/harden Windows 10 as much as possible while not impacting usability at all. (Think being able to run on this computer's of family members so secure them but not increase the chances of them having to call you to troubleshoot something related to it later on). References for virtually all settings can be found at the bottom. Just before the references section, you will always find several security settings commented out as they could lead to compatibility issues in common consumer setups but they're worth considering.
:: Obligatory 'views are my own'. :)
:: Thank you @jaredhaight for the Win Firewall config recommendations!
:: Thank you @ricardojba for the DLL Safe Order Search reg key!
:: Thank you @jessicaknotts for the help on testing Exploit Guard configs and checking privacy settings!
:: Best script I've found for Debloating Windows 10: https://github.com/Sycnex/Windows10Debloater
:
@bilelmoussaoui
bilelmoussaoui / github.py
Last active May 12, 2017 21:54
Manage your labels
import requests
from urllib.parse import urlencode
import logging
ORGANIZATION = "elementary"
logging.basicConfig(format='%(asctime)-15s %(message)s')
logger = logging.getLogger('github')
logger.setLevel(logging.INFO)
@lewisgoddard
lewisgoddard / ControlPoints.md
Last active May 22, 2017 20:07
A list of control points and their monitors.
  • Domain Names
    • Registrar: Namesilo
    • Monitoring: "Domain Names"/"Registrar"
    • Second Factor: Yes
  • DNS
    • Nameserver Pointer: "Domain Names"/"Registrar"
    • Record Control: Digital Ocean
    • Monitoring: See "HTTP"/"Monitoring"
    • Second Factor: Yes
  • SSL