I hereby claim:
- I am chrsjhnsn on github.
- I am seeej (https://keybase.io/seeej) on keybase.
- I have a public key ASCLkFXaIQmXJoFbDnCP6UcumsGXYu25jiZegj_6XUU-JQo
To claim this, I am signing this object:
I dave is for pronanal Sumn! | |
Where for. | |
That't know the amn its some loed then Eliallanging a Can'm want egersbont and her been 16's couay. | |
And you got to. | |
No anywhings? | |
It feces. | |
This Guys turn. | |
That's the cops one it fol my sayought, momen oor. | |
You and come twant. | |
Whey pronpy. |
#!/usr/bin/env python | |
__description__ = "Program to analyze password history" | |
__author__ = 'Didier Stevens' | |
__version__ = '0.0.1' | |
__date__ = '2017/02/27' | |
""" | |
Source code put in public domain by Didier Stevens, no Copyright |
function Get-String | |
{ | |
Param( | |
[Parameter(Mandatory = $true, Position = 0)] | |
[byte[]]$InputStream | |
) | |
[byte[]]$Output = @(); | |
foreach($byte in $InputStream) | |
{ | |
if($byte -eq 0) |
I hereby claim:
To claim this, I am signing this object:
--------------- | |
MATCH (u:User)-[r:AdminTo|MemberOf*1..]->(c:Computer | |
RETURN u.name | |
That’ll return a list of users who have admin rights on at least one system either explicitly or through group membership | |
--------------- | |
MATCH | |
(U:User)-[r:MemberOf|:AdminTo*1..]->(C:Computer) |
{"lastUpload":"2019-08-02T18:49:46.186Z","extensionVersion":"v3.4.1"} |
#!/usr/bin/env bash | |
#Title........: airgeddon.sh | |
#Description..: This is a multi-use bash script for Linux systems to audit wireless networks. Modified for light mode in tmux by seajay. | |
#Author.......: v1s1t0r | |
#Date.........: 20190908 | |
#Version......: 9.22 | |
#Usage........: bash airgeddon.sh | |
#Bash Version.: 4.2 or later | |
#Global shellcheck disabled warnings |
#!/bin/bash | |
# prereqs: jq, all the dumps in current working dir | |
# create csv file, add headers | |
echo "source,type,domain,username,result" >out.csv | |
# function: remove first and last lines: | |
sedfl() { | |
sed '1d;$d' | |
} |
#!/bin/bash | |
# Requirements: httpie, jq | |
# Inspired by: | |
# https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2019/april/apples_app_site_association_the_new_robots_txt/ | |
echo 'Testing URL for AASA' | |
full=$1/.well-known/apple-app-site-association | |
check=`curl -sL -w "%{http_code}\n" "$full" -o /dev/null` |
Cypher Queries
Cypher Queries can be entered into the neo4j console, accessible at http://localhost:7474. These often return text-based content. There's a max of 1000 displayed rows within the console, however each query result can be downloaded as a CSV for more in depth analysis. When pasting, replace all instances of "EXAMPLE.COM" with the domain name that you are operating on. These are from a wide range of sources. A lot of them came or were inspired by discussions on the Bloodhound Slack.
Basic
Generate list of all operating systems
MATCH (c:Computer)