Skip to content

Instantly share code, notes, and snippets.

View yojota's full-sized avatar
💭
Trabajando en nuevas ideas

Jota Perez yojota

💭
Trabajando en nuevas ideas
View GitHub Profile
@yojota
yojota / world_clock.sh
Created January 10, 2022 14:46
A little script for run a world clock in terminal linux (tmux)
#!/bin/bash
#TimeZones
#TZ='America/Mexico_City' tty-clock -sct -f "%a, %d %b %Y %T %z"
#TZ='America/Bogota' tty-clock -sct -f "%a, %d %b %Y %T %z"
#TZ='America/Lima' tty-clock -sct -f "%a, %d %b %Y %T %z"
#TZ='America/New_York' tty-clock -C 3 -sct -f "%a, %d %b %Y %T %z"
#TZ='America/Argentina/Jujuy' tty-clock -sctx -f "%a, %d %b %Y %T %z"
# reference https://en.wikipedia.org/wiki/List_of_tz_database_time_zones
@yojota
yojota / actualizarwindowsporconsola.txt
Created May 19, 2017 14:54
Script powershell para actualizar windows por consola
## ------------------------------------------------------------------
## PowerShell Script To Automate Windows Update
## Script should be executed with "Administrator" Privilege
## ------------------------------------------------------------------
$ErrorActionPreference = "SilentlyContinue"
If ($Error) {
$Error.Clear()
}
$Today = Get-Date
@yojota
yojota / resultado.txt
Created May 19, 2017 12:50
Resultado
Nmap scan report for 192.168.10.145
Host is up (0.00088s latency).
PORT STATE SERVICE
445/tcp open microsoft-ds
MAC Address: 94:DE:80:8B:DB:67 (Giga-byte Technology)
Host script results:
|_smb-vuln-ms17-010: Could not connect to 'IPC$'
Nmap scan report for 192.168.10.161
@yojota
yojota / wannaycry.txt
Last active June 5, 2017 12:16
Wannacry discover with nmap
Una forma de scanear la vulnerabilidad es utilizando nmap
Instalamos nmap:
#apt-get install nmap
Luego descarmos el script especifico para nmap
# cd /usr/share/nmap/scripts/
# wget https://raw.githubusercontent.com/cldrn/nmap-nse-scripts/master/scripts/smb-vuln-ms17-010.nse
# nmap -sC -p445 --open --max-hostgroup 3 --script smb-vuln-ms17-010.nse 192.168.0.1/24