Skip to content

Instantly share code, notes, and snippets.

View lsr00ter's full-sized avatar

letsroot lsr00ter

View GitHub Profile
@lsr00ter
lsr00ter / python-nmap_example.py
Created August 26, 2017 04:30 — forked from brianteachman/python-nmap_example.py
Quick port scan script in python using python-nmap.
# http://xael.org/norman/python/python-nmap
# lets check for common ports using nmap
import nmap
nmScan = nmap.PortScanner()
nmScan.scan('127.0.0.1', '0-1023')
for port in nmScan['127.0.0.1']['tcp']:
thisDict = nmScan['127.0.0.1']['tcp'][port]
print 'Port ' + str(port) + ': ' + thisDict['product'] + ', v' + thisDict['version']
@lsr00ter
lsr00ter / all.txt
Created September 7, 2018 08:31 — forked from jhaddix/all.txt
all wordlists from every dns enumeration tool... ever. Please excuse the lewd entries =/
This file has been truncated, but you can view the full file.
.
..
........
@
*
*.*
*.*.*
🐎
@lsr00ter
lsr00ter / centos_setup.sh
Created October 9, 2020 16:32 — forked from jakebathman/centos_setup.sh
CentOS box initial setup script
#!/bin/bash
# Base box setup steps
# Do the steps below as root user
sudo su
# The steps below are based on a clean install on
# CentOS 7 (build 1608)
# http://cloud.centos.org/centos/7/images/CentOS-7-x86_64-GenericCloud-1608.raw.tar.gz
MD
TermUrl
a
adjust_campaign
alternatives
amount
app
app_id
appname
avoid
From: http://redteams.net/bookshelf/
Techie
Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp.
Social Engineering: The Art of Human Hacking by Christopher Hadnagy
Practical Lock Picking: A Physical Penetration Tester's Training Guide by Deviant Ollam
The Art of Deception: Controlling the Human Element of Security by Kevin Mitnick
Hacking: The Art of Exploitation by Jon Erickson and Hacking Exposed by Stuart McClure and others.
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning by Fyodor
The Shellcoder's Handbook: Discovering and Exploiting Security Holes by several authors
@lsr00ter
lsr00ter / 20211210-TLP-WHITE_LOG4J.md
Created December 12, 2021 07:14 — forked from SwitHak/20211210-TLP-WHITE_LOG4J.md
BlueTeam CheatSheet * Log4Shell* | Last updated: 2021-12-12 0023 UTC
@lsr00ter
lsr00ter / install.sh
Last active May 25, 2023 05:06 — forked from gythialy/install.sh
install and config zsh tmux
#!/bin/bash
set -e
cd $HOME
# install zsh and tmux
sudo yum -y install git zsh tmux
echo "setting antigen and zsh"
curl -L git.io/antigen | sudo tee /opt/antigen.zsh
@lsr00ter
lsr00ter / install.sh
Last active December 12, 2023 09:13 — forked from mislav/bashrc
Basic vimrc and tmux config for servers
curl -fsSL \
"https://gist.github.com/mislav/5706063/raw/vimrc" -o ~/.vimrc \
"https://gist.github.com/mislav/5706063/raw/ssh_rc.sh" -o ~/.ssh/rc \
"https://gist.github.com/mislav/5706063/raw/tmux.conf" -o ~/.tmux.conf
curl -fsSL "https://gist.github.com/wr00t/ede9ac998395415fd02898a5e63e2509/raw/zshrc" >> ~/.zshrc
chmod +x ~/.ssh/rc
@lsr00ter
lsr00ter / settings.json
Created April 10, 2024 15:57 — forked from diego3g/settings.json
VSCode Settings (Updated)
{
"workbench.startupEditor": "newUntitledFile",
"editor.fontSize": 14,
"editor.lineHeight": 1.8,
"javascript.suggest.autoImports": true,
"javascript.updateImportsOnFileMove.enabled": "always",
"editor.rulers": [80, 120],
"extensions.ignoreRecommendations": true,
"typescript.tsserver.log": "off",
"files.associations": {
@lsr00ter
lsr00ter / test_dll.c
Created April 12, 2024 11:17 — forked from Homer28/test_dll.c
DLL code for testing CVE-2024-21378 in MS Outlook
/**
* This DLL is designed for use in conjunction with the Ruler tool for
* security testing related to the CVE-2024-21378 vulnerability,
* specifically targeting MS Outlook.
*
* It can be used with the following command line syntax:
* ruler [auth-params] form add-com [attack-params] --dll ./test.dll
* Ruler repository: https://github.com/NetSPI/ruler/tree/com-forms (com-forms branch).
*
* After being loaded into MS Outlook, it sends the PC's hostname and