This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # Identify the internal drive | |
| lsblk | |
| # Wipe everything (replace /dev/sda with the correct device) | |
| sudo wipefs -a /dev/sda | |
| sudo sgdisk --zap-all /dev/sda | |
| sudo dd if=/dev/zero of=/dev/sda bs=1M count=100 | |
| sudo dd if=/dev/zero of=/dev/sda bs=1M seek=$(( $(sudo blockdev --getsz /dev/sda) / 2048 - 100 )) | |
| count=100 | |
| sudo sync |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import asyncio | |
| import os | |
| import subprocess | |
| import time | |
| import sys | |
| import shutil | |
| import argparse | |
| from kasa import Discover, Credentials | |
| # ========================================== |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import asyncio | |
| import os | |
| import subprocess | |
| import time | |
| import sys | |
| import shutil | |
| import argparse | |
| import re | |
| from kasa import Discover, Credentials |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import asyncio | |
| import os | |
| import subprocess | |
| import time | |
| import sys | |
| import shutil | |
| import argparse | |
| import re | |
| from kasa import Discover, Credentials |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import asyncio | |
| import os | |
| import subprocess | |
| import time | |
| import re | |
| from kasa import Discover, Credentials | |
| # --- CONFIGURATION --- | |
| TARGET_VID = "0634" # Crucial Vendor ID | |
| TARGET_PID = "5603" # Crucial Product ID |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| # ---------------------------------------------------- | |
| # SNIPER ELITE: HARDENED LOOP (State Aware) | |
| # ---------------------------------------------------- | |
| # TARGET CONFIGURATION | |
| TARGET_VID="0634" | |
| TARGET_PID="5603" | |
| # RECOVERY FILES |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| function Get-UpdatableGroupsEnhanced { | |
| <# | |
| .SYNOPSIS | |
| Finds groups that can be updated by the current user and includes group type information. | |
| Author: Modified from original by Ryan Watson (Watson0x90) | |
| License: MIT | |
| Required Dependencies: None | |
| Optional Dependencies: None | |
| .DESCRIPTION |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # Script Name: DataTransformationLoader.py | |
| # Author: Ryan Watson | |
| # Gist Github: https://gist.github.com/Watson0x90 | |
| # Created on: 2025-04-03 | |
| # Last Modified: 2025-04-03 | |
| # Description: Data transformation loader for hacker-themed visualization | |
| # Purpose: This script is designed to create a hacker-themed data transformation visualization using the rich library. | |
| # Version: 1.0.0 | |
| # License: MIT License | |
| # Dependencies: rich |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # This is a proof of concept for CVE-2020-5377, an arbitrary file read in Dell OpenManage Administrator | |
| # Proof of concept written by: David Yesland @daveysec with Rhino Security Labs | |
| # More information can be found here: | |
| # A patch for this issue can be found here: | |
| # https://www.dell.com/support/article/en-us/sln322304/dsa-2020-172-dell-emc-openmanage-server-administrator-omsa-path-traversal-vulnerability | |
| from xml.sax.saxutils import escape | |
| import http.server | |
| import ssl | |
| import sys |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import socket | |
| from concurrent.futures import ThreadPoolExecutor | |
| import ipaddress | |
| import argparse | |
| def parse_ports(file_path): | |
| """ | |
| Parses a file containing port numbers and ranges, expanding ranges into individual ports. | |
| """ | |
| ports = set() # Use a set to avoid duplicates |
NewerOlder