Skip to content

Instantly share code, notes, and snippets.

#!/bin/bash
# base on:
# https://gist.github.com/the-robot/354ca1e9b6c1b194d523b0d52f206c70
Original=$1
OriginalPath=$(realpath $Original)
Repackage="${Original%.*}_repackage.dpkg"
cd $(mktemp -d)
@the-robot
the-robot / repackage-zst-dpkg.md
Last active February 1, 2023 07:47 — forked from goproslowyo/repackage.md
Repackage a Package Because dpkg on Ubuntu Doesn't Known the Compression of the Member Inside

What does the problem look like?

Because of this bug the libnet1 dpkg installation fails.

$ sudo dpkg -i --force-overwrite /var/cache/apt/archives/libnet1_1.1.6+dfsg-3.1build2_amd64.deb
dpkg-deb: error: archive '/var/cache/apt/archives/libnet1_1.1.6+dfsg-3.1build2_amd64.deb' uses unknown compression for member 'control.tar.zst', giving up
dpkg: error processing archive /var/cache/apt/archives/libnet1_1.1.6+dfsg-3.1build2_amd64.deb (--install):
 dpkg-deb --control subprocess returned error exit status 2
Errors were encountered while processing:
@the-robot
the-robot / kerberos_attacks_cheatsheet.md
Created December 31, 2022 10:00 — forked from TarlogicSecurity/kerberos_attacks_cheatsheet.md
A cheatsheet with commands that can be used to perform kerberos attacks

Kerberos cheatsheet

Bruteforcing

With kerbrute.py:

python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>

With Rubeus version with brute module:

@the-robot
the-robot / PowerView-2.0-tricks.ps1
Created December 15, 2022 04:09 — forked from HarmJ0y/PowerView-2.0-tricks.ps1
PowerView-2.0 tips and tricks
# NOTE: the most updated version of PowerView (http://www.harmj0y.net/blog/powershell/make-powerview-great-again/)
# has an updated tricks Gist at https://gist.github.com/HarmJ0y/184f9822b195c52dd50c379ed3117993
# get all the groups a user is effectively a member of, 'recursing up'
Get-NetGroup -UserName <USER>
# get all the effective members of a group, 'recursing down'
Get-NetGroupMember -GoupName <GROUP> -Recurse
# get the effective set of users who can administer a server

Keybase proof

I hereby claim:

  • I am the-robot on github.
  • I am 0x06 (https://keybase.io/0x06) on keybase.
  • I have a public key ASBse_6o-nqmMjiqvaU6YpW1fvmn6yrlKcSy7kt95hD2Wgo

To claim this, I am signing this object:

@the-robot
the-robot / libc_warning.md
Created November 30, 2021 14:01
Remove `libc++1` warning

vi /var/lib/dpkg/status and remove libc++1 from it. Slack and Discord are affected in Kali because libc++1 is replaced with libstdc++.

@the-robot
the-robot / get-pip2.py
Created November 6, 2021 12:12
get-pip2.py
This file has been truncated, but you can view the full file.
#!/usr/bin/env python
#
# Hi There!
#
# You may be wondering what this giant blob of binary data here is, you might
# even be worried that we're up to something nefarious (good for you for being
# paranoid!). This is a base85 encoding of a zip file, this zip file contains
# an entire copy of pip (version 20.3.4).
#
# Pip is a thing that installs packages, pip itself is a package that someone
@the-robot
the-robot / Fix Windows & Linux Wrong Time.md
Last active September 5, 2021 10:05
Fix Windows & Linux Wrong Time

Make Linux use local time

timedatectl set-local-rtc 1 --adjust-system-clock

timedatectl # to check

Link

@the-robot
the-robot / Creating a new launcher in Gnome3.md
Last active September 5, 2021 13:27
Creating a new launcher in Gnome3

Install the executable for local user

I usually store all app data in ~/.local/apps and if it is executable, I directly store under ~/.local.bin

For .AppImage use the command below to extract the icon image.

./x.AppImage --appimage-extract
@the-robot
the-robot / Restore the GRUB Bootloader.md
Last active September 5, 2021 08:56 — forked from dianjuar/Restore the GRUB Bootloader.md
Restore the GRUB Bootloader on Manjaro Linux. Usefull when your fresh windows install eats your grub and can not boot into your linux installation, or for some how your grub is missing

Restore the GRUB Bootloader on Manjaro

  1. Chroot into your linux instalation
    1. The easiest way is with mhwd-chroot
      1. Install it yaourt -S mhwd-chroot
      2. Run it sudo mhwd-chroot
      3. DONE, you have chrooted into your linux installation (open a root console of your installed linux OS, is like just open a console with root access)
  2. Restore your GRUB
    1. Install a new GRUB bootloader with grub-install /dev/sda
    2. Recheck to ensure the that installation has completed without any errors grub-install --recheck /dev/sda