Skip to content

Instantly share code, notes, and snippets.

@secure-77
secure-77 / Use-Impersonation.ps1
Last active April 19, 2024 19:17 — forked from idavis/Use-Impersonation.ps1
Impersonate a user and execute a script block as that user
#ToExecute
$userName = "user"
$domain = "domain"
$password = '<<<PASS>>>'
$Path = '\\some\path\here'
.\Use-Impersonation.ps1 $userName $domain $password {Get-ChildItem $Path | Foreach { Write-Host $_.Name }}
@secure-77
secure-77 / server.py
Created September 11, 2021 13:11 — forked from mdonkers/server.py
Simple Python 3 HTTP server for logging all GET and POST requests
#!/usr/bin/env python3
"""
Very simple HTTP server in python for logging requests
Usage::
./server.py [<port>]
"""
from http.server import BaseHTTPRequestHandler, HTTPServer
import logging
class S(BaseHTTPRequestHandler):
@secure-77
secure-77 / system_scan_py3.py
Last active March 7, 2020 21:42 — forked from sh1n0b1/linuxprivchecker.py
linuxprivchecker.py -- a Linux Privilege Escalation Check Script
#!/usr/env python
###############################################################################################################
# [Title]: linuxprivchecker.py -- a Linux Privilege Escalation Check Script -- Python3 Version
# [Author]: Mike Czumak (T_v3rn1x) -- @SecuritySift
# -------------------------------------------------------------------------------------------------------------
# [Details]:
# This script is intended to be executed locally on a Linux box to enumerate basic system info and
# search for common privilege escalation vectors such as world writable files, misconfigurations, clear-text
# passwords and applicable exploits.