Skip to content

Instantly share code, notes, and snippets.

View zard777's full-sized avatar
🦊
Adrenaline+

Eric D zard777

🦊
Adrenaline+
View GitHub Profile
@zard777
zard777 / FB Reclaim Identity.md
Created December 28, 2019 08:51
Facebook issue with Identities thief
@zard777
zard777 / windows_hardening.cmd
Created November 6, 2018 16:10 — forked from mackwage/windows_hardening.cmd
Script to perform some hardening of Windows OS
::
::#######################################################################
::
:: Change file associations to protect against common ransomware attacks
:: Note that if you legitimately use these extensions, like .bat, you will now need to execute them manually from cmd or powershell
:: Alternatively, you can right-click on them and hit 'Run as Administrator' but ensure it's a script you want to run :)
:: ---------------------
ftype htafile="%SystemRoot%\system32\NOTEPAD.EXE" "%1"
ftype WSHFile="%SystemRoot%\system32\NOTEPAD.EXE" "%1"
ftype batfile="%SystemRoot%\system32\NOTEPAD.EXE" "%1"
@zard777
zard777 / ca_AIO.md
Last active October 19, 2018 11:56
Certificates self-signed (server, client, CA)

Create the CA Key and Certificate for signing Client Certs

  • openssl genrsa -des3 -out ca.key 4096
  • openssl req -new -x509 -days 3650 -key ca.key -out ca.crt

(Optional) Remove Passphrase from Key

  • cp X.key X.key.abc
  • openssl rsa -in X.key.abc -out X.key
@zard777
zard777 / nmapburp.sh
Created September 7, 2018 20:09 — forked from jgamblin/nmapburp.sh
NMap a network and send all open web servers to Burp.
#!/bin/bash
#Script to Scan All Sites Found With A Simple NMAP Scan With Burp.
sites=$(nmap "$1" --open 443 --resolve-all --open -oG - | awk 'NR!=1 && /open/{print $2}')
for site in $sites
do
curl -vgw "\\n" 'http://127.0.0.1:1337/v0.1/scan' -d '{"urls":["'"$site"'"]}' > /dev/null 2>&1
printf "Scanning %s with burp.\\n" "$site"
done
@zard777
zard777 / bypass-firewall-and-probe-ports.html
Created September 7, 2018 18:59 — forked from Shamar/bypass-firewall-and-probe-ports.html
PoC exploit: bypass a corporate firewall through JavaScript and a DNS
<html>
<!-- This is a very simple Proof of Concepts of just one of the possible attacks
described at https://bugzilla.mozilla.org/show_bug.cgi?id=1487081
You can give it a try by following the instruction at
https://dev.to/shamar/the-meltdown-of-the-web-4p1m
Just please, remember to restore your /etc/hosts after.
-->
<head>
<script type="text/javascript">
@zard777
zard777 / cloud_metadata.txt
Created June 30, 2018 10:58 — forked from jhaddix/cloud_metadata.txt
Cloud Metadata Dictionary useful for SSRF Testing
## AWS
# from http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html#instancedata-data-categories
http://169.254.169.254/latest/user-data
http://169.254.169.254/latest/user-data/iam/security-credentials/[ROLE NAME]
http://169.254.169.254/latest/meta-data/iam/security-credentials/[ROLE NAME]
http://169.254.169.254/latest/meta-data/ami-id
http://169.254.169.254/latest/meta-data/reservation-id
http://169.254.169.254/latest/meta-data/hostname
http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key
@zard777
zard777 / coin-hive_domains.txt
Created June 21, 2018 08:08 — forked from PaulSec/coin-hive_domains.txt
Domain with coin-hive integration (only from top 1M Alexa)
0x00sec.org
100-bal.ru
123kubo.info
123moviesfull.co
123movies.re
1337x.io
141jav.com
14byte.net
1568783.com
1587865.com
@zard777
zard777 / 101__Git.md
Last active October 9, 2019 05:00
Git 101

Clone repo and update your commits

  • Tips:
  • Set a Git username:
$ git config --global user.name "Arsene Lupin"
  • Recheck if you set username correctly
@zard777
zard777 / EQgroup.md
Created March 4, 2018 10:41 — forked from bontchev/EQgroup.md
Curated list of links describing the leaked Equation Group tools for Windows

Links describing the leaked EQ Group tools for Windows

Repositories and ports

Installation and usage guides

Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run]
"WindowsDefender"=hex:06,00,00,00,00,00,00,00,00,00,00,00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"WindowsDefender"=hex(2):22,00,25,00,50,00,72,00,6f,00,67,00,72,00,61,00,6d,00,\
46,00,69,00,6c,00,65,00,73,00,25,00,5c,00,57,00,69,00,6e,00,64,00,6f,00,77,\
00,73,00,20,00,44,00,65,00,66,00,65,00,6e,00,64,00,65,00,72,00,5c,00,4d,00,\
53,00,41,00,53,00,43,00,75,00,69,00,4c,00,2e,00,65,00,78,00,65,00,22,00,00,\