Skip to content

Instantly share code, notes, and snippets.

View seajaysec's full-sized avatar

Chris Farrell seajaysec

View GitHub Profile
@seajaysec
seajaysec / wpa2eextract.ps1
Created March 7, 2019 17:00
zc00l's WPA2 Enterprise Password Extraction Script
function Get-String
{
Param(
[Parameter(Mandatory = $true, Position = 0)]
[byte[]]$InputStream
)
[byte[]]$Output = @();
foreach($byte in $InputStream)
{
if($byte -eq 0)
@seajaysec
seajaysec / password-history.py
Created March 7, 2019 16:56
Didier Stevens' Password History Analysis Tool
#!/usr/bin/env python
__description__ = "Program to analyze password history"
__author__ = 'Didier Stevens'
__version__ = '0.0.1'
__date__ = '2017/02/27'
"""
Source code put in public domain by Didier Stevens, no Copyright
---------------
MATCH (u:User)-[r:AdminTo|MemberOf*1..]->(c:Computer
RETURN u.name
That’ll return a list of users who have admin rights on at least one system either explicitly or through group membership
---------------
MATCH
(U:User)-[r:MemberOf|:AdminTo*1..]->(C:Computer)
@seajaysec
seajaysec / customqueries.json
Last active April 2, 2024 19:25
bloodhound custom queries
{
"queries": [{
"name": "List all owned users",
"queryList": [{
"final": true,
"query": "MATCH (m:User) WHERE m.owned=TRUE RETURN m"
}]
},
{
"name": "List all owned computers",
I dave is for pronanal Sumn!
Where for.
That't know the amn its some loed then Eliallanging a Can'm want egersbont and her been 16's couay.
And you got to.
No anywhings?
It feces.
This Guys turn.
That's the cops one it fol my sayought, momen oor.
You and come twant.
Whey pronpy.