Skip to content

Instantly share code, notes, and snippets.

@parthdmaniar
parthdmaniar / README.md
Created March 16, 2020 17:09 — forked from stevedodson/README.md
Introduction to supervised machine learning in Elastic webinar - Tuesday, February 25, 2020

Introduction to supervised machine learning in Elastic webinar

Tuesday, February 25, 2020

Data and Python Jupyter Notebooks

Customer churn demo

input {
tcp {
port => 5000
type => syslog
}
udp {
port => 5000
type => syslog
}
}
@parthdmaniar
parthdmaniar / Invoke-Psexec.ps1
Created December 24, 2020 18:12 — forked from HarmJ0y/Invoke-Psexec.ps1
Invoke-Psexec
function Invoke-PsExec {
<#
.SYNOPSIS
This function is a rough port of Metasploit's psexec functionality.
It utilizes Windows API calls to open up the service manager on
a remote machine, creates/run a service with an associated binary
path or command, and then cleans everything up.
Either a -Command or a custom -ServiceEXE can be specified.
For -Commands, a -ResultsFile can also be specified to retrieve the

Keybase proof

I hereby claim:

  • I am parthdmaniar on github.
  • I am parthmaniar (https://keybase.io/parthmaniar) on keybase.
  • I have a public key ASAxsqX6l8VnvAYIMx-PeE8bVFoqAk_0PrX7rsbTKKc9gAo

To claim this, I am signing this object: