Skip to content

Instantly share code, notes, and snippets.

View tempuser1909's full-sized avatar

Eddie T. tempuser1909

View GitHub Profile
@HarmJ0y
HarmJ0y / cobaltstrike_sa.txt
Created September 28, 2018 22:22
Cobalt Strike Situational Awareness Commands
Windows version:
reg query x64 HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion
Users who have authed to the system:
ls C:\Users\
System env variables:
reg query x64 HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Environment
Saved outbound RDP connections:
@k3170makan
k3170makan / cryptanalysis.py
Created July 22, 2015 20:04
A Script that assists in the differential cryptanalysis of the DiffMe Block Cipher
#!/usr/bin/python
from diffme import DiffMe
from random import random
#build a map of input-outpu differentials
"""
this little script performs differential cryptanalysis of the DiffMe cipher.
Here's how it works:
1. It bulids a matrix of all the possible inputs that correlates the XOR differences
2. using this it builds a dictionary of input differentials (XOR differences) mapped to output differentials
@sckalath
sckalath / windows_privesc
Last active January 22, 2026 09:20
Windows Privilege Escalation
// What system are we connected to?
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
// Get the hostname and username (if available)
hostname
echo %username%
// Get users
net users
net user [username]