Go to Rocket.Chat Wiki to get more information https://github.com/RocketChat/Rocket.Chat/wiki/Deploy-Rocket.Chat-without-docker?ts=2
View Backdoor all users in AWS account
#!/usr/bin/env python | |
from __future__ import print_function | |
import boto3 | |
from botocore.exceptions import ClientError | |
import json | |
def main(args): | |
backdoor_users(get_users()) |
View user.js
// Get all users | |
var url = "http://localhost:8080/api/v1/users"; | |
var xhr = new XMLHttpRequest() | |
xhr.open('GET', url, true) | |
xhr.onload = function () { | |
var users = JSON.parse(xhr.responseText); | |
if (xhr.readyState == 4 && xhr.status == "200") { | |
console.table(users); | |
} else { | |
console.error(users); |
View pem2plex.py
#!/usr/bin/python | |
import sys | |
import hashlib | |
from OpenSSL.crypto import * | |
def main(): | |
if(len(sys.argv) != 4): | |
print sys.argv[0] + " /path/to/ssl.crt /path/to/ssl.key ProcessedMachineIdentifier" | |
sys.exit(0) |
View SetPalette.c
#ifndef WIN32_NO_STATUS | |
# define WIN32_NO_STATUS | |
#endif | |
#include <windows.h> | |
#include <assert.h> | |
#include <stdio.h> | |
#include <winerror.h> | |
#include <winternl.h> | |
#include <stddef.h> | |
#include <winnt.h> |
View cmiyc-chall9-pfx-crack.txt
grutz@beelzebubba:loop$ backup$ openssl pkcs12 -in backup/mabel.pfx | |
Enter Import Password: | |
Mac verify error: invalid password? | |
grutz@beelzebubba:loop$ /opt/pw-crackers/jtr/JohnTheRipper/run/pfx2john backup/mabel.pfx | |
mabel:$pfx$*2558*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 |
View Raspi-Haste-Server.sh
#!/bin/bash -ex | |
#Check for root | |
LUID=$(id -u) | |
if [[ $LUID -ne 0 ]]; then | |
echo "$0 must be run as root" | |
exit 1 | |
fi | |
View p12.php
<?php | |
$p12cert = array(); | |
$file = 'https://myserver.com/myp12file.p12'; | |
$c = file_get_contents($file); | |
if (openssl_pkcs12_read($c, $p12cert, '1234567890') ) | |
{ | |
$pkey = $p12cert['pkey']; //private key |
View makeImage.sh
#!/bin/bash | |
# A bash script to create a time machine disk image suitable for | |
# backups with OS X 10.6 (Snow Leopard) | |
# This script probably only works for me, so try it at your own peril! | |
# Use, distribute, and modify as you see fit but leave this header intact. | |
# (R) sunkid - September 5, 2009 | |
# | |
# This will create a time machine ready disk image named with your | |
# computer's name with a maximum size of 600GB and copy it to | |
# /Volumes/backup. The image "file" (it's a directory, really) will |
NewerOlder