Terminator - Terminal emulator
zsh - My shell of choice
prezto - Configuration management for zsh
010 Editor - Hex editor
VSCode - Text editor
| <# | |
| .SYNOPSIS | |
| This script retrieves Azure Active Directory (AD) applications with expired secrets and checks their sign-in logs. | |
| .DESCRIPTION | |
| The script first retrieves all Azure AD applications using the Get-AzADApplication cmdlet. It then filters these applications to only include those where the password credential has expired more than 30 days ago and where there is only one password credential. | |
| For each of these applications, the script retrieves the AppId and constructs three queries to check the sign-in logs for the last 30 days. The queries are for service principal sign-ins, non-interactive user sign-ins, and interactive sign-ins. | |
| The script then executes these queries using the Invoke-AzOperationalInsightsQuery cmdlet and stores the results in three separate variables: $servicePrincipalSignins, $nonInteractiveSignins, and $interactiveSignins. | |
| Finally, the script outputs the results of these queries. |
| #!/bin/bash | |
| CYAN="$(tput bold; tput setaf 6)" | |
| RESET="$(tput sgr0)" | |
| clear | |
| if command -v python3 > /dev/null 2>&1; then | |
| if [ $(python3 -c "print('ye')") = "ye" ]; then | |
| clear |
| #!/bin/bash | |
| #Script to Scan All Sites Found With A Simple NMAP Scan With Burp. | |
| sites=$(nmap "$1" --open 443 --resolve-all --open -oG - | awk 'NR!=1 && /open/{print $2}') | |
| for site in $sites | |
| do | |
| curl -vgw "\\n" 'http://127.0.0.1:1337/v0.1/scan' -d '{"urls":["'"$site"'"]}' > /dev/null 2>&1 | |
| printf "Scanning %s with burp.\\n" "$site" | |
| done |
A list of useful tools
| # A list of notable security tools/projects written in Ruby | |
| # Compiled by @claudijd with help from open-source | |
| Metasploit Framework [https://github.com/rapid7/metasploit-framework] | |
| The Browser Exploitation Framework Project [https://github.com/beefproject/beef] | |
| Brakeman [https://github.com/presidentbeef/brakeman] | |
| Arachni [https://github.com/Arachni/arachni] | |
| Ronin [https://github.com/ronin-ruby/ronin] | |
| RailsGoat [https://github.com/OWASP/railsgoat] | |
| Serpico [https://github.com/MooseDojo/Serpico] |