First we index the numbers from 1 to 10 using json_lines and cryptocli in a temporary index.
seq 1 10 | \
bash json_lines.sh number 1 2>/dev/null | \
./cryptocli \
-- stdin \
-- line \
-- elasticsearch-put \
--index number_messages \
First we index the numbers from 1 to 10 using json_lines and cryptocli in a temporary index.
seq 1 10 | \
bash json_lines.sh number 1 2>/dev/null | \
./cryptocli \
-- stdin \
-- line \
-- elasticsearch-put \
--index number_messages \
| #!/bin/bash | |
| set -e | |
| mkdir -pv /opt/local/{share,tools,bin} | |
| mkdir -pv /opt/local/share/wordlists | |
| PATH=/opt/local/bin:${PATH} | |
| echo "deb http://kali.download/kali kali-rolling main contrib non-free" > /etc/apt/sources.list |
How to install xmind (on kali):
apt install openjdk-8-jdk libwebkit2gtk-4.0libwebkitgtk-1.0-0 from the setup.sh scriptsetup.sh as root./XMind_64/Xmind| #!/bin/sh | |
| set -e | |
| ## SEE https://medium.com/@ebuschini/iptables-and-docker-95e2496f0b45 | |
| ## You need to add rules in DOCKER-BLOCK AND INPUT for traffic that does not go to a container. | |
| ## You only need to add one rule if the traffic goes to the container | |
| CWD=$(cd "$(dirname "${0}")"; pwd -P) | |
| FILE="${CWD}/$(basename "${0}")" |
| #!/usr/bin/env python | |
| # Copyright (c) 2018 Matthew Daley | |
| # | |
| # Permission is hereby granted, free of charge, to any person obtaining a copy | |
| # of this software and associated documentation files (the "Software"), to | |
| # deal in the Software without restriction, including without limitation the | |
| # rights to use, copy, modify, merge, publish, distribute, sublicense, and/or | |
| # sell copies of the Software, and to permit persons to whom the Software is | |
| # furnished to do so, subject to the following conditions: |
| # Example for tor client to connect to onion service | |
| HidServAuth <onion service> <auth from hostname> | |
| DataDir ~/.tor | |
| SocksPort 9050 # set the port of the proxy |
| unbind [ | |
| unbind p | |
| bind Escape copy-mode | |
| bind p paste-buffer | |
| bind-key -Tcopy-mode-vi 'v' send -X begin-selection | |
| bind-key -Tcopy-mode-vi 'y' send -X copy-pipe-and-cancel "xclip -se c -i" | |
| bind-key -Tcopy-mode-vi Escape send -X cancel |
| unbind [ | |
| unbind p | |
| bind Escape copy-mode | |
| bind p paste-buffer | |
| bind-key -Tcopy-mode-vi 'v' send -X begin-selection | |
| bind-key -Tcopy-mode-vi 'y' send -X copy-pipe-and-cancel "xclip -se c -i" | |
| bind-key -Tcopy-mode-vi Escape send -X cancel | |
| set-option -s set-clipboard off |
| package main | |
| /* | |
| The goal of this PoC is to try to exec a payload built within the binary. | |
| I kind of use the same idea as for protobuf, compile the target into executable | |
| then copy the payload inside the program, do the reverse operation and exec it. | |
| It works like this: | |
| - compile your binary to the target arch | |
| - use cryptocli dd -in <binary> -encoders gzip,byte-string -out <temp_file> |