I hereby claim:
- I am macostag on github.
- I am macostag (https://keybase.io/macostag) on keybase.
- I have a public key ASB1e7iMFdOZFMekIM59iorlll2dkAr2p71K5ffiPCAbOAo
To claim this, I am signing this object:
$groupFiles = Get-ChildItem -Filter *.* -Recurse | Get-FileHash -Algorithm SHA1 | Group-Object -Property Hash | |
$groupFiles | Where-Object {$_.count -gt 1} | | |
ForEach-Object { | |
$_.Group | Select-Object -Skip 1 | |
} | Remove-Item |
I hereby claim:
To claim this, I am signing this object:
#VirusTotal Public API v2.0 Script | |
import requests | |
import hashlib | |
import pprint | |
class VT(): | |
def __init__(self): | |
self.apiKey = '' | |
self.baseUrl = 'https://www.virustotal.com/vtapi/v2' |
import pefile | |
import pprint | |
import datetime | |
import sys | |
import magic | |
def getMagicType(buffer): | |
typeFile = magic.from_buffer(buffer) | |
return typeFile |
.386 | |
.model flat, stdcall | |
option casemap :none | |
extrn MessageBoxA@16 : PROC | |
extrn ExitProcess@4 : PROC | |
.data | |
HelloW db "Hello World!!!",0 | |
TitleH db "MessageBox",0 |
Import-Module ActiveDirectory | |
$DomDN = (Get-ADDomain).DistinguishedName | |
$forest = (Get-ADDomain).Forest | |
$Ou = Get-ADOrganizationalUnit -Filter 'Name -like "Usuarios"' | |
$file = Import-Csv .\Users.csv | |
$data = $File | select @{Name="Name";Expression={$_.GivenName + " " + $_.Surname}}, | |
@{Name="SamAccountName"; Expression={$_.Username}}, |
#Setup | |
#------ | |
#Setup Metasploit database | |
service postgresql start | |
update-rc.d postgresql enable | |
msfdb init | |
#Installation | |
#-------------- | |
#HTTPScreenShot |
import binascii | |
import random | |
import hashlib | |
import base64 | |
from pyDes import * | |
def encrypt3DES(skey,sdata): | |
key = binascii.unhexlify(skey) | |
data = binascii.unhexlify(sdata) | |
key3DES = triple_des(key, ECB, "\0\0\0\0\0\0\0\0", pad=None, padmode=PAD_NORMAL) |
import binascii | |
import random | |
import hashlib | |
import base64 | |
from pyDes import * | |
def decrypt3DES(skey,sdata): | |
key = binascii.unhexlify(skey) | |
data = binascii.unhexlify(sdata) | |
key3DES = triple_des(key, ECB, "\0\0\0\0\0\0\0\0", pad=None, padmode=PAD_NORMAL) |