Skip to content

Instantly share code, notes, and snippets.

View Invoke-Psexec.ps1
function Invoke-PsExec {
<#
.SYNOPSIS
This function is a rough port of Metasploit's psexec functionality.
It utilizes Windows API calls to open up the service manager on
a remote machine, creates/run a service with an associated binary
path or command, and then cleans everything up.
Either a -Command or a custom -ServiceEXE can be specified.
For -Commands, a -ResultsFile can also be specified to retrieve the
View logstash-syslog.conf
input {
tcp {
port => 5000
type => syslog
}
udp {
port => 5000
type => syslog
}
}
@parthdmaniar
parthdmaniar / README.md
Created Mar 16, 2020 — forked from stevedodson/README.md
Introduction to supervised machine learning in Elastic webinar - Tuesday, February 25, 2020
View README.md

Introduction to supervised machine learning in Elastic webinar

Tuesday, February 25, 2020

Data and Python Jupyter Notebooks

Customer churn demo