I hereby claim:
- I am ticarpi on github.
- I am ticarpi (https://keybase.io/ticarpi) on keybase.
- I have a public key whose fingerprint is F2BB 7E45 E957 33BD 67F3 CAAB B22F 33DF D72F 28D7
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
#! /bin/bash | |
ip_addr=`ip addr | grep "inet 192" | cut -d" " -f6 | cut -d"/" -f1` | |
rand_port=`head -n10 /dev/urandom | tr -dc "1-9" | tail -c4` | |
echo "#############################################################" | |
echo "# RevShellMe - a script for lazy Reverse Shells by @ticarpi #" | |
echo "# [Payloads loving stolen from @pentestmonkey] #" | |
echo "#############################################################" | |
echo |
#!/usr/bin/env python3 | |
############################################################ | |
# A LibSSH RCE tool by @ticarpi # | |
# Cloned/carved/tweaked from multiple sources # | |
# This checks an SSH port to see if it's vulnerable to # | |
# CVE-2018-10933 # | |
# If it is it will prompt you for commands to run remotely # | |
# Usage: # | |
# $ python libssh_exploit_CVE-2018-10933.py <ip> <port> # |
cmd.exe /k |
{ | |
"keys":[ | |
{ | |
"kty":"RSA", | |
"kid":"jwt_tool", | |
"use":"sig", | |
"e":"AQAB", | |
"n":"nj6PB6aVqg_mBhlhtx5th9W3tnmqiUZoX_Y-cOTW9YtkkRpxsQOt2vWQXNv31Wo027xrXOYA54dc-sXoYCfgWUZZ20XX9-WRRawHpT7CafKpbhFIFxMVy8ZJXqk701ihtKiOCeMopbBMi2ezCvR8L_cqfMLFACXvzV8UChNK6i1iyb7LRJbU2_U_Zw0I587NKDhq34QMKSG4ly7ibX0YpQXMEGOF8xS-JJSOdrVqPvwI7iFQP9LSzyY0f33rPoImABsrlDFIjjNYr2UVKWzzCwd_4sOMLQOdwTmFxR29754d6_qZaRd0oqTMwdCcuLE2dOGlxO7IFJcUX38_4TCvUQ" | |
} | |
] |
alert(document.domain) |
FROM python:3.8-alpine as compile | |
WORKDIR /opt | |
RUN apk add --no-cache git gcc musl-dev python3-dev libffi-dev openssl-dev cargo | |
ADD . /opt/impacket | |
WORKDIR /opt/impacket | |
RUN python3 -m pip install -r requirements.txt | |
RUN python3 setup.py install | |
WORKDIR /opt/impacket/examples | |
ENTRYPOINT ["python3"] |
Some golden links when you are having issues: https://social.technet.microsoft.com/Forums/windows/en-US/96016a13-9062-4842-b534-203d2f400cae/ca-certificate-request-error-quotdenied-by-policy-module-0x80094800quot-windows-server-2008?forum=winserversecurity
Download and install Certi
@echo off | |
REM Title: lolcheckz.cmd | |
REM Version: 1.1 | |
REM Description: A script to check local policy settings on the local machine. Does not require Powershell, but does require elevation. | |
REM Author: Chris Hogarth | |
REM Created: March 2019 | |
REM Modified: July 2021 | |
:switchoptions | |
set logoutput="" |
libChex has now moved to: | |
https://github.com/ticarpi/ticwebtools/blob/main/libChex.js | |
Grab it from there. | |
PRs for additional detections welcome :) |