Skip to content

Instantly share code, notes, and snippets.

#!/usr/bin/env bash
set -eu
sudo apt-get -y install devscripts dpkg-dev git uthash-dev
git clone -b release-4.6 --single-branch https://gitlab.com/wireshark/wireshark.git
cd wireshark
ln -sn packaging/debian
sudo DEB_BUILD_PROFILES="pkg.wireshark.stratoshark" mk-build-deps -i debian/control
@timkent
timkent / printer.cfg
Last active June 17, 2024 16:23
Klipper config for Lulzbot TAZ 6 running Archim2 board with SE/E3D 2.85/0.5mm tool head
[include mainsail.cfg]
# This file contains common pin mappings for Ultimachine Archim2
# boards. To use this config, the firmware should be compiled for the
# SAM3x8e.
# See docs/Config_Reference.md for a description of parameters.
[stepper_x]
step_pin: PC6
import keyboard
import winsound
woof_keys = 'puy'
meow_keys = 'elachoe'
def play_quack(key):
if key.name in meow_keys:
winsound.PlaySound('cat_meow2.wav', winsound.SND_ASYNC)
elif key.name in woof_keys:
@timkent
timkent / burp-firefox.txt
Created August 14, 2017 05:15
Setup of Firefox for use with Burp
Set proxy:
https://support.portswigger.net/customer/portal/articles/1783066-configuring-firefox-to-work-with-burp
Install SSL cert:
https://support.portswigger.net/customer/portal/articles/1783087-Installing_Installing%20CA%20Certificate%20-%20FF.html
Install "Proxy Switcher" to quickly disable/enable going through Burp:
https://addons.mozilla.org/en-US/firefox/addon/proxy-switcher/
@timkent
timkent / windows-exploit-suggester.txt
Created August 7, 2017 07:13
Kali windows-exploit-suggester.py install
tim@kali:~$ mkdir ~/windows-exploit-suggester
tim@kali:~$ cd ~/windows-exploit-suggester
tim@kali:~/windows-exploit-suggester$ wget "https://raw.githubusercontent.com/GDSSecurity/Windows-Exploit-Suggester/master/windows-exploit-suggester.py"
Can be updated and run with (-i specifies path to file containing output from 'systeminfo' on client):
tim@kali:~/windows-exploit-suggester$ ./windows-exploit-suggester.py -u
tim@kali:~/windows-exploit-suggester$ ./windows-exploit-suggester.py -d 2017-08-07-mssb.xls -i /tmp/systeminfo.txt
@timkent
timkent / peda.txt
Last active September 15, 2017 13:06
Kali install of PEDA
tim@kali:~$ git clone https://github.com/longld/peda.git ~/peda
tim@kali:~$ echo 'source ~/peda/peda.py' >> ~/.gdbinit
You can disable at any time by comment out with a hash:
tim@kali:~$ vi ~/.gdbinit
#source ~/peda/peda.py
# Useful when single stepping through ASM and stack isn't so relevant:
define hook-stop
context code,register
@timkent
timkent / empire.txt
Created August 7, 2017 01:06
Kali PowerShell Empire install
tim@kali:~$ sudo apt-get install zlib1g-dev
tim@kali:~$ wget https://github.com/EmpireProject/Empire/archive/2.0.tar.gz
tim@kali:~$ tar xzf Empire-2.0.tar.gz
tim@kali:~$ cd Empire-2.0
tim@kali:~/Empire-2.0$ vi setup/install.sh
Change 'libssl-dev' to 'libssl1.0-dev' here:
Release=Kali
apt-get install -y make g++ python-dev python-m2crypto swig python-pip libxml2-dev default-jdk libssl1.0-dev
@timkent
timkent / tweaks.txt
Last active July 18, 2022 07:25
Kali VM tweaks
Update:
# apt update
# apt dist-upgrade
# apt clean
Create a non-privileged user with sudo access:
# adduser tim
# adduser tim sudo
Allow packet capture as tim user: