Skip to content

Instantly share code, notes, and snippets.

;#NoTrayIcon
;#SingleInstance force
;#Persistent
;#InstallKeybdHook
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
;
; Logitech T650 mappings for Windows 10.
;
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
pipeline {
agent {
docker {
image 'maven:3-alpine'
args '-v /root/.m2:/root/.m2'
}
}
stages {
stage('Build') {
steps {
@pianomanx
pianomanx / windows_privesc
Created October 11, 2020 16:30 — forked from api0cradle/windows_privesc
Windows Privilege Escalation
// What system are we connected to?
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
// Get the hostname and username (if available)
hostname
echo %username%
// Get users
net users
net user [username]
@pianomanx
pianomanx / Jenkinsfile
Created October 3, 2020 01:01 — forked from jonico/Jenkinsfile
Example for a full blown Jenkins pipeline script with multiple stages, kubernetes templates, shared volumes, input steps, injected credentials, heroku deploy, sonarqube and artifactory integration, Docker containers, multiple Git commit statuses, PR merge vs branch build detection, REST API calls to GitHub deployment API, stage timeouts, stage c…
#!groovy
import groovy.json.JsonOutput
import groovy.json.JsonSlurper
def label = "mypod-${UUID.randomUUID().toString()}"
podTemplate(label: label, yaml: """
spec:
containers:
- name: mvn
image: maven:3.3.9-jdk-8-alpine

Keybase proof

I hereby claim:

  • I am pianomanx on github.
  • I am pianomanx (https://keybase.io/pianomanx) on keybase.
  • I have a public key ASCM7rHCSchApD5DOwT9r0ODIGE-DUIbo6bDHfwGeCR5tgo

To claim this, I am signing this object:

@pianomanx
pianomanx / DangItBobby.ps1
Created May 4, 2017 04:59 — forked from danieltharp/DangItBobby.ps1
PowerShell script to find where a user is logged into on the network and disable their NIC.
# ********************************************************************************
#
# Script Name: DangItBobby.ps1
# Version: 1.0.0
# Author: bluesoul <https://bluesoul.me>
# Date: 2016-04-06
# Applies to: Domain Environments
#
# Description: This script searches for a specific, logged on user on all or
# specific Computers by checking the process "explorer.exe" and its owner. It