Skip to content

Instantly share code, notes, and snippets.

@mostwantedduck
mostwantedduck / setup_tools.sh
Last active October 6, 2022 13:26
Setup Tools For Web Pentesting
#!/usr/bin/env bash
# Apt Install Critical Tools
sudo apt update
sudo apt upgrade -y
sudo apt install curl git jq wget
echo "Download GO"
cd $HOME
wget https://go.dev/dl/go1.17.7.linux-amd64.tar.gz
:: Windows 10 OSED Setup
::
:: Connect over RDP with: rdesktop IP -u Offsec -p lab -r disk:kali=/home/kali/OSED/ -P
:: Store files in ~/OSED/files/. Check script for appropriate file locations
::
:: Extra files sourced from: https://github.com/corelan/windbglib
::
::::::::::::::::::::::::::::::::::::::::::::::::::::::::
:: Install mona
@mostwantedduck
mostwantedduck / settings.json
Created October 25, 2021 10:39
Personal Configuration for VSCode
{
"workbench.colorTheme": "Hack The Box",
"security.workspace.trust.untrustedFiles": "open",
"editor.fontFamily": "JetBrainsMono NF, Consolas, 'Courier New', monospace",
"editor.fontSize": 12,
"editor.fontWeight": "300",
"editor.lineHeight": 20,
"editor.letterSpacing": 0.5,
"editor.fontLigatures": true,
"editor.wordWrap": "on",
@mostwantedduck
mostwantedduck / windbg_workspace_dark2.reg
Created October 25, 2021 10:34
WinDbg Workspace Dark v2
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Windbg]
"Default"=hex:57,44,57,53,01,00,\
00,00,08,00,04,00,10,00,04,00,00,00,00,00,a0,04,00,00,31,00,00,00,38,00,30,\
00,61,00,73,00,20,00,24,00,61,00,6c,00,74,00,5f,00,6e,00,74,00,64,00,6c,00,\
6c,00,73,00,79,00,6d,00,20,00,6e,00,74,00,64,00,6c,00,6c,00,0a,00,00,00,28,\
00,00,00,78,00,70,00,73,00,78,00,65,00,20,00,6c,00,64,00,3a,00,73,00,79,00,\
73,00,74,00,65,00,6d,00,20,00,3b,00,0a,00,73,00,78,00,65,00,20,00,63,00,6c,\
00,72,00,6e,00,20,00,3b,00,0a,00,73,00,78,00,2d,00,20,00,2d,00,63,00,20,00,\
@mostwantedduck
mostwantedduck / customqueries.json
Created June 2, 2021 10:22 — forked from seajaysec/customqueries.json
bloodhound custom queries
{
"queries": [{
"name": "List all owned users",
"queryList": [{
"final": true,
"query": "MATCH (m:User) WHERE m.owned=TRUE RETURN m"
}]
},
{
"name": "List all owned computers",
import requests
import time
import sys
from base64 import b64encode
from requests_ntlm2 import HttpNtlmAuth
from urllib3.exceptions import InsecureRequestWarning
from urllib import quote_plus
requests.packages.urllib3.disable_warnings(category=InsecureRequestWarning)

Finding creds in git repos is awesome.

$ for commit in $(seq 1 $(git reflog | wc -l)); do git diff HEAD@{$commit} 2>/dev/null | grep password; done
-spring.datasource.password=g!'301T%y%xT@uL`
+spring.datasource.password=4AT&G;[H@&'\^uDK
-spring.datasource.password=UmAnR=-v|{2=gyx?
+spring.datasource.password=4AT&G;[H@&'\^uDK
...
#!/bin/bash
RED='\033[0;31m'
WHITE='\033[0;37m'
NC='\033[0m' # No Color
trap ctrl_c INT
function ctrl_c() {
echo -e "${RED}\n\n[*] Terminando...\n${WHITE}"