Skip to content

Instantly share code, notes, and snippets.

Generación sencilla de scripts en Bash

1.1. Configuración

Es necesario editar el archivo de configuración ".bashrc"

vim ~/.bashrc

vim /etc/bashrc
#!/bin/bash
#set -x
set -e
PASSWORD="jenny$((RANDOM))"
echo "[+] Cleaning ~/.mitmproxy"
rm -rf ~/.mitmproxy
mkdir -p ~/.mitmproxy
cd ~/.mitmproxy
@h0ffy
h0ffy / jfet_reader.md
Last active March 28, 2025 07:33
JFet Read With Arduino
          10kΩ  
  +12V/24V ───/\/\/───┬── Drenaje (D)  
                        │  
                      (JFET)  
                        │  
       10kΩ             ┴── Fuente (S) ─── GND  
   A0 ───/\/\/───┬  
        47kΩ     │  
 │ │ 
@h0ffy
h0ffy / security-regex.md
Last active December 2, 2024 19:26
JennyDoc

SECRETS

Secrets Regex
amzn.mws]{8}-[0-9a-f]{4}-10-9a-f1{4}-[0-9a,]{4}-[0-9a-f]{12}
(A3T[A-Z0-9]|AKIA|AGPA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}
(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}
https:\/\/hooks.slack.com\/services\/T[a-zA-Z0-9_]{8}\/B[a-zA-Z0-9_]{8}\/[a-zA-Z0-9_]{24}

1. RedTeam Windows Post-Explotation Commands

1.1. SysInsternals Suite

1.1.1. Accesschk.exe

Check all files and directories for access control lists (ACLs) and display the results in a human-readable format

accesschk.exe -accepteula -wus "Users" c:\*.* > C:\WINDOWS\TEMP\listÇ_paths_writeable_by_users.txt