Skip to content

Instantly share code, notes, and snippets.

View RajChowdhury240's full-sized avatar
💻
just another learner

Raj Chowdhury RajChowdhury240

💻
just another learner
  • Confidential
  • $ aws sts get-caller-identity
  • 21:15 (UTC +10:00)
View GitHub Profile
#!/usr/bin/env python3
"""
Script to list all active AWS accounts under the 'innovate' Organizational Unit (OU),
including accounts in nested OUs, and save the output to a CSV file.
Columns: AccountName, AccountId, OUPath
"""
import boto3
import csv
import sys
https://fzl-aws.notion.site/TombWatcher-HTB-20fb231ab1b68048b73bc92c932edfbc?source=copy_link
from diagrams import Diagram, Cluster
from diagrams.aws.network import VPC, ELB, APIGateway
from diagrams.aws.compute import EC2, Lambda
from diagrams.aws.database import RDS, Dynamodb
from diagrams.aws.storage import S3
from diagrams.aws.analytics import Glue
with Diagram("Serverless Architecture", show=True):
s3 = S3("S3 Bucket")
api = APIGateway("API Gateway")
import shutil
from rich.console import Console
from rich.table import Table
def get_disk_usage(path="/"):
total, used, free = shutil.disk_usage(path)
return {
"Mount Point": path,
"Total (GB)": f"{total / (1024 ** 3):.2f}",
"Used (GB)": f"{used / (1024 ** 3):.2f}",
https://fzl-aws.notion.site/RBCD-Using-NXC-1f3b231ab1b680ed985bc2ed8e32ee3f?pvs=4
[+] Listening for events...
[HTTP] NTLMv2 Client : ::ffff:10.10.10.248
[HTTP] NTLMv2 Username : intelligence\Ted.Graves
[HTTP] NTLMv2 Hash : Ted.Graves::intelligence:c96717a8d336a67a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
foreground = c0caf5
background = 000000




theme = Dark Pastel
foreground = c0caf5
background = 000000
theme = Dark Pastel
'use client'
import React from "react"
import { Sparkles } from "lucide-react"
import { motion } from "framer-motion"
const Card = ({ children }: { children: React.ReactNode }) => (
<div className="bg-white/5 backdrop-blur-xl border border-white/10 rounded-2xl shadow-2xl">
{children}
</div>
"""
This script can easily configure /etc/krb5.conf for evil-winrm, by providing a domain fqdn and domain controller name
So that evil-winrm can be used with kerberos authentication
Evil-winrm Example:
```bash
export KRB5CCNAME=Administrator.ccache
evil-winrm -i forest.htb.local -r htb.local
```