I hereby claim:
- I am logikphreak on github.
- I am pkelley (https://keybase.io/pkelley) on keybase.
- I have a public key whose fingerprint is A16B 1865 26EC 7D2D 8769 A55E 7B9F D7BB 16EB 3469
To claim this, I am signing this object:
| Domain | IP Address | Registration Date | |
|---|---|---|---|
| crowdstriker.com | 3.64.163.50 | 2019-06-12T19 | |
| crovvdstrike.com | 15.197.148.33 | 2015-08-01T18 | |
| xn--crodstrike-r29d.com | 52.90.112.110 | 2023-12-23T00 | |
| xn--crowdstrke-r8a.com | 15.197.148.33 | 2020-04-01T20 | |
| crowdstrilke.com | 172.67.214.208 | 2024-02-20T17 | |
| crowdstrik.com | 172.67.131.2 | 2016-11-11T17 | |
| crwdstrike.com | 8.8.8.8 | 2020-01-23T17 | |
| crowdstroke.com | 15.197.225.128 | 2014-07-11T23 | |
| crow.dstrike.com | 54.161.222.85 | Unknown |
| #fields indicator indicator_type meta.source meta.do_notice meta.desc | |
| forms.office3.com Intel::DOMAIN CPS-CTI F OFFICE-PHISHING | |
| forms.office8.com Intel::DOMAIN CPS-CTI F OFFICE-PHISHING | |
| forms.officea.com Intel::DOMAIN CPS-CTI F OFFICE-PHISHING | |
| forms.officek.com Intel::DOMAIN CPS-CTI F OFFICE-PHISHING | |
| forms.officep.com Intel::DOMAIN CPS-CTI F OFFICE-PHISHING | |
| forms.officec.com Intel::DOMAIN CPS-CTI F OFFICE-PHISHING | |
| forms.officed.com Intel::DOMAIN CPS-CTI F OFFICE-PHISHING | |
| forms.office2.com Intel::DOMAIN CPS-CTI F OFFICE-PHISHING | |
| forms.office4.com Intel::DOMAIN CPS-CTI F OFFICE-PHISHING |
| $drive = "C:\" | |
| $days = 7 # Number of days to consider as "recent" | |
| # Download the wordlist file | |
| $wordlistUrl = "https://raw.githubusercontent.com/CriticalPathSecurity/Zeek-Intelligence-File-Names/main/Zeek-Intelligence-File-Names.txt" | |
| $wordlistPath = "$env:TEMP\Zeek-Intelligence-File-Names.txt" | |
| Invoke-WebRequest -Uri $wordlistUrl -OutFile $wordlistPath | |
| # Read the wordlist file into an array | |
| $wordlist = Get-Content -Path $wordlistPath |
| import subprocess | |
| def run_nmap(cidr_block, output_file): | |
| command = f"nmap -A -oX {output_file} {cidr_block}" | |
| try: | |
| subprocess.check_call(command, shell=True) | |
| print(f"Nmap scan results saved to: {output_file}") | |
| except subprocess.CalledProcessError as e: | |
| print(f"Error executing Nmap command: {e}") |
| # Python script to convert subnets to lists of IP | |
| # Prompt the user to input a subnet in CIDR notation | |
| subnet = input("Enter the subnet in CIDR notation (e.g. 192.168.1.0/24): ") | |
| # Split the subnet into IP address and CIDR mask | |
| ip_addr, cidr = subnet.split("/") | |
| cidr = int(cidr) | |
| # Calculate the netmask | |
| netmask = (0xffffffff << (32 - cidr)) & 0xffffffff |
| ###################################################### | |
| # Bro script to parse (MS-SQL) TDS data streams and # | |
| # extract SQL statements and TDS7 login information. # | |
| # # | |
| # parsetds.bro v2014.01.27 # | |
| # https://malwaremusings.com/scripts/parsetds.bro # | |
| # # | |
| # usage: # | |
| # Place the script in $BRO_HOME/share/bro/site # | |
| # and either load it from local.bro with # |
| - name: Remove MS-MSDT Key | |
| hosts: win-test | |
| gather_facts: false | |
| tasks: | |
| - win_command: powershell.exe - | |
| args: | |
| stdin: reg export HKCR\ms-msdt c:\msdt-export.reg | |
| - win_command: powershell.exe - |
| aircrack-ng -w 000webhost.txt,10k_most_common.txt,10_million_password_list_top_1000000.txt,500-worst-passwords.txt,adobe100.txt,alleged-gmail-passwords.txt,Ashley_Madison.txt,Basic_Spanish_List.txt,best1050.txt,bt4-password.txt,cain.txt,carders.cc.txt,common-passwords-win.txt,conficker.txt,darkc0de.txt,elitehacker.txt,english.txt,faithwriters.txt,hak5.txt,honeynet-nocount.txt,hotmail.txt,john.txt,KeyboardCombinations.txt,korelogic-password.txt,MostPopularLetterPasses.txt,myspace.txt,password-permutations.txt,passwords_youporn2012.txt,rockyou.txt,singles.org.txt,SplashData-2015.txt,Sucuri_Top_Wordpress_Passwords.txt,twitter-banned.txt,wordpress_attacks_july2014.txt |
I hereby claim:
To claim this, I am signing this object:
| # If you want dnsmasq to listen for DHCP and DNS requests only on | |
| # specified interfaces (and the loopback) give the name of the | |
| # interface (eg eth0) here. | |
| # Repeat the line for more than one interface. | |
| interface=at0 | |
| #interface=wlan0mon | |
| #interface=wlan0 | |
| # Uncomment this to enable the integrated DHCP server, you need | |
| # to supply the range of addresses available for lease and optionally |