Skip to content

Instantly share code, notes, and snippets.

View slayerlab's full-sized avatar
🐞

Slayer slayerlab

🐞
View GitHub Profile
@slayerlab
slayerlab / newpost.sh
Created November 1, 2021 01:39
This script helps to create a new Jekyll post quickly.
#!/bin/bash
JEKYLL_PATH="YOUR_JEKYLL_PATH"
POST_DATE=$(date +%Y-%m-%d)
TITLE=$1
FILENAME="$POST_DATE-${TITLE//\ /-}" || ""
[[ -z "$TITLE" ]] \
&& {
echo >&2 "[!] Filename not set." \
&& exit 1;
@slayerlab
slayerlab / CVE-2021-41773.go
Last active October 7, 2021 05:01
A collection to exploit and assess the CVE-2021-41773 vulnerability regardless of your OS.
package main
import (
"fmt"
"flag"
"net/http"
"io/ioutil"
"strings"
"os"
)
@slayerlab
slayerlab / .zshrc
Created March 5, 2021 12:20
Fix Kali Linux terminal display
# Check your environment locale:
# $ env | grep 'LANG'
# GDM_LANG=en_US.utf8
# LANG=en_US.UTF-8
# LANGUAGE=en_US.UTF-8
# Adjust ~/.zshrc
# [snippet]
if [[ "$color_prompt" = yes ]]; then
PROMPT=$'%F{%(#.blue.green)}┌──${debian_chroot:+($debian_chroot)──}(%B%F{%(#.red.blue)}%n%(#.💀.💣)%m%b%F{%(#.blue.green)})-[%B%F{reset}%(6~.%-1~/…/%4~.%5~)%b%F{%(#.blue.green)}]\n└─%B%(#.%F{red}#.%F{blue}$)%b%F{reset} '
@slayerlab
slayerlab / desc.sh
Last active February 26, 2025 18:45
HTTP Live Streaming -- Transport Stream Video Download
#!/bin/bash
file=$(sed -e 's/[[:space:]]/_/g' <<< $1)
desc=$2
echo "
$desc
" > Practica_6/$file.txt
#EOF
#!/bin/bash
:<<'USAGE'
$exrc $urlp $urls $out
$1 $2 $3 $4
$0 Pratica3-Limite <URL_PLAYLIST> <URL_SEGMENT> <OUTPUT_MP4>
USAGE
exrc=$1
plstd="$exrc/playlist"
@slayerlab
slayerlab / bad_sequel.py
Created March 6, 2020 17:36 — forked from 3xocyte/bad_sequel.py
PoC MSSQL RCE exploit using Resource-Based Constrained Delegation
#!/usr/bin/env python
# for more info: https://shenaniganslabs.io/2019/01/28/Wagging-the-Dog.html
# this is a rough PoC
# requirements for RCE:
# - the attacker needs to either have or create an object with a service principal name
# - the MSSQL server has to be running under the context of System/Network Service/a virtual account
# - the MSSQL server has the WebClient service installed and running (not default on Windows Server hosts)
# - NTLM has to be in use
@slayerlab
slayerlab / .tmux
Created June 8, 2019 12:25
My marginally `TMUX(1)` configuration file: ~/.tmux.conf
# List of plugins
# Reference: https://github.com/tmux-plugins/tpm
set -g @plugin 'tmux-plugins/tpm'
set -g @plugin 'tmux-plugins/tmux-sensible'
# Personal plugins
set -g @plugin 'tmux-plugins/tmux-logging'
# Remap prefix to screens
set -g prefix C-q
@slayerlab
slayerlab / linuxprivchecker3.py
Last active May 21, 2019 18:37
From Python2 "linuxprivchecker.py" to Python 3 – credits to: https://github.com/sleventyeleven/linuxprivchecker
#!/usr/env python3
###############################################################################################################
# [Title]: linuxprivchecker.py -- a Linux Privilege Escalation Check Script
# [Author]: Mike Czumak (T_v3rn1x) -- @SecuritySift
# [Edited]: Slayer @ May 17, 2019
# -------------------------------------------------------------------------------------------------------------
# [Details]:
# This script is intended to be executed locally on a Linux box to enumerate basic system info and
# search for common privilege escalation vectors such as world writable files, misconfigurations, clear-text
@slayerlab
slayerlab / instancemethod.py
Last active February 26, 2025 19:08
[PoC] Modify an instance method using the built-in class type.
#!/usr/bin/env python3
# The focus here is the L#34 and L#35.
class Birthday:
def __init__(self, day=1, month=2, year=3):
self._day = day
self._month = month
self._year = year
// ==UserScript==
// @name Meteor Miner
// @namespace MeteorMiner
// @version 0.2
// @description Extract data form Meteor
// @author Tim Medin (Counter Hack)
// @match http://*/*
// @match https://*/*
// @require https://code.jquery.com/jquery-3.1.1.min.js
// @require https://ajax.googleapis.com/ajax/libs/jqueryui/1.12.1/jquery-ui.min.js