Skip to content

Instantly share code, notes, and snippets.

View noraj's full-sized avatar
💎
FLOSSing

Alexandre ZANNI noraj

💎
FLOSSing
View GitHub Profile
@noraj
noraj / adb.md
Created July 12, 2022 18:07
Inject Android key events from ADB
@noraj
noraj / patch.md
Created July 9, 2022 14:17
Patch the Protestware behavior in sweetalert2
@noraj
noraj / fr-tlds.rb
Created April 20, 2022 22:44
Liste des TLDs pour la France et ses DROM-COM (départements et régions d'outre-mer et collectivités d'outre-mer)
=begin
Liste des TLDs pour la France et ses DROM-COM (départements et régions
d'outre-mer et collectivités d'outre-mer)
=end
require 'docopt'
TLDs = {
'bl' => 'Saint-Barthélemy',
'fr' => 'France',
'gf' => 'Guyane française',
@noraj
noraj / README.md
Created January 3, 2018 14:21
Guides and scripts for installing StackEdit
@noraj
noraj / README.md
Last active August 7, 2021 17:32
Leave a TryHackMe room

What?

Here is a short JS snippet to leave a room on TryHackMe.

Why?

Context: I joined the room https://tryhackme.com/room/linuxctf a long time ago when it was free but has become VIP-only, so I have it appearing in "My rooms" but cannot do it and since I'm redirected to the VIP subscription page I can't leave it.

How?

@noraj
noraj / pretty-csv.rb
Last active June 9, 2021 19:28
List installed BA pentest tools + description
#!/usr/bin/env ruby
require 'csv'
installed_tools = %x(pacman -Sl blackarch).split("\n").grep(/\[installed\]/)
tools_list = []
installed_tools.each do |line|
_repo, tool, _version, _status = line.split(' ', 4)
description = %x(pacman -Qs #{tool}).split("\n")[1].strip
@noraj
noraj / axfr.sh
Created May 4, 2019 17:44
Quick bash script using dig for AXFR zone transfer enum
#!/bin/bash
domain='zonetransfer.me'
ns=$(dig +noall +answer NS $domain | awk '{print $5}')
for server in $ns
do
dig @$server AXFR $domain
done
@noraj
noraj / BetterSSH.py
Last active May 9, 2020 15:47
Side files for HackTheBox Obscurity Writeup https://rawsec.ml/en/hackthebox-obscurity-write-up/
import sys
import random, string
import os
import time
import crypt
import traceback
import subprocess
path = ''.join(random.choices(string.ascii_letters + string.digits, k=8))
session = {"user": "", "authenticated": 0}
@noraj
noraj / services_bin_path.txt
Last active April 25, 2020 19:48
Side files for HackTheBox Control Writeup https://rawsec.ml/en/hackthebox-control-write-up/
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\1394ohci
ImagePath REG_EXPAND_SZ \SystemRoot\System32\drivers\1394ohci.sys
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\3ware
ImagePath REG_EXPAND_SZ System32\drivers\3ware.sys
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\ACPI
ImagePath REG_EXPAND_SZ System32\drivers\ACPI.sys