Skip to content

Instantly share code, notes, and snippets.

View 6t2's full-sized avatar
:bowtie:

6t2

:bowtie:
  • United States
View GitHub Profile
@6t2
6t2 / osed-rp-helper.ps1
Created June 3, 2025 16:38 — forked from 2S1one/osed-rp-helper.ps1
RP powershell wrapper
$max_depth = 6
$rp_exe_path = "C:\tools\rp-win-x86.exe"
$out_dir = Join-Path (Get-Location) "rp_output"
$all_prefix = "all_"
$target_files = $args
# Ensure the output directory exists
New-Item -ItemType Directory -Path $out_dir -Force -ErrorAction SilentlyContinue | Out-Null
@6t2
6t2 / CIPolicyParser.ps1
Created February 11, 2024 15:00
Functions to recover information from binary Windows Defender Application Control (WDAC) Code Integrity policies.
# Ensure System.Security assembly is loaded.
Add-Type -AssemblyName System.Security
function ConvertTo-CIPolicy {
<#
.SYNOPSIS
Converts a binary file that contains a Code Integrity policy into XML format.
Author: Matthew Graeber (@mattifestation)
@6t2
6t2 / pulseversion.py
Created January 6, 2022 05:46 — forked from sei-vsarvepalli/pulseversion.py
Pulse Secure Version Scanner
import requests
import sys
import re
import semver
import json
import signal
import warnings
warnings.filterwarnings("ignore")
HEADERS = {"User-Agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:67.0) Gecko/20100101 Firefox/67.0"}
@6t2
6t2 / kerberos_attacks_cheatsheet.md
Created September 11, 2021 18:53 — forked from TarlogicSecurity/kerberos_attacks_cheatsheet.md
A cheatsheet with commands that can be used to perform kerberos attacks

Kerberos cheatsheet

Bruteforcing

With kerbrute.py:

python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>

With Rubeus version with brute module:

@6t2
6t2 / Hollowing.cs
Created August 27, 2021 20:02 — forked from smgorelik/Hollowing.cs
Simple Process Hollowing C#
/***************
* Simple Process Hollowing in C#
*
* #Build Your Binaries
* c:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe Hollowing.cs /unsafe
*
* @author: Michael Gorelik <smgorelik@gmail.com>
* gist.github.com/smgorelik/9a80565d44178771abf1e4da4e2a0e75
* #Most of the code taken from here: @github: github.com/ambray
@6t2
6t2 / namemash.py
Created May 1, 2021 09:05 — forked from superkojiman/namemash.py
Creating a user name list for brute force attacks.
#!/usr/bin/env python
import sys
import os.path
if __name__ == "__main__":
if len(sys.argv) != 2:
print("usage: {} names.txt".format((sys.argv[0])))
sys.exit(0)
if not os.path.exists(sys.argv[1]):
@6t2
6t2 / eCPPT-NetSec-Cheatsheet
Created June 13, 2018 00:41
eCPPT Network cheat
eCPPT NETWORK SECURITY
*DNS Enumeration
nslookup example.com
nslookup -query=mx domain
nslookup -query=ns domain
nslookup -query=any domain
interactime mode {
@6t2
6t2 / offsec.md
Created June 13, 2018 00:31
Penetrating Testing/Assessment Workflow

Penetrating Testing/Assessment Workflow & other fun infosec stuff

https://github.com/jivoi/pentest

My feeble attempt to organize (in a somewhat logical fashion) the vast amount of information, tools, resources, tip and tricks surrounding penetration testing, vulnerability assessment, and information security as a whole*