password

Recuperar el password (SecureString) de los credenciales que se han importado de un fichero JSON con PowerShell

1 Star2 Stars3 Stars4 Stars5 Stars (4 votes, average: 5.00 out of 5)
Loading...


Utilizar credenciales en formato JSON que han sido exportados con Get-Credential y arrancar el programa Notepad en PowerShell

1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
Loading...


Exportar credenciales con Get-Credential en un fichero JSON con PowerShell

1 Star2 Stars3 Stars4 Stars5 Stars (2 votes, average: 5.00 out of 5)
Loading...


This information concerns the security of your account (SCAM)

1 Star2 Stars3 Stars4 Stars5 Stars (4 votes, average: 5.00 out of 5)
Loading...

NUNCA HAY QUE HACER CASO A ESTE TIPO DE CORREOS SON UN TIMO. Esto ha llegado hoy a mi correo: Hi! I am a hacker who has access to your operating system. I also have full access to your account: At the time of hacking your account(@gmail.com) had this password: You can say: this is my, but old password! Or: I can change my password at any time! Of course! You will be right, but the fact is that when you change the password, my malicious code every time saved a new one! I’ve been watching you for a few […]


Crear, compilar y ejecutar una DLL con Microsoft Visual C# que crear un usuario desde PowerShell

1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
Loading...

Crear un proyecto en Visual C# Biblioteca de Clase (.NET Framework) Importar desde Microsoft Visual C# la referencia al ensamblado System.Management.Automation (C:\Windows\assembly\GAC_MSIL\System.Management.Automation\1.0.0.0__31bf3856ad364e35\System.Management.Automation.dll) Añadir el siguiente código en PowerShell a Visual Studio C# y compilar la solución

La dll compilada se encuentra en la carpeta bin Llamar a la dll creada desde PowerShell

 


pspy – unprivileged linux process snooping

1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
Loading...

pspy is a command line tool designed to snoop on processes without need for root permissions. It allows you to see commands run by other users, cron jobs, etc. as they execute. Great for enumeration of Linux systems in CTFs. Also great to demonstrate your colleagues why passing secrets as arguments on the command line is a bad idea. The tool gathers it’s info from procfs scans. Inotify watchers placed on selected parts of the file system trigger these scans to catch short-lived processes. Getting started Get the tool onto the Linux machine you want to inspect. First get the […]


Crear código QR para la conexión wifi

1 Star2 Stars3 Stars4 Stars5 Stars (2 votes, average: 5.00 out of 5)
Loading...


Simular una fuerza bruta mediante peticiones HTTP desde PowerShell utilizando el método GET

1 Star2 Stars3 Stars4 Stars5 Stars (14 votes, average: 2.71 out of 5)
Loading...


Enviar señales de radio desde Raspberry Pi mediante una conexión SSH desde PowerShell (parte 3)

1 Star2 Stars3 Stars4 Stars5 Stars (4 votes, average: 3.00 out of 5)
Loading...


Dejavu: audio fingerprinting and recognition in Python

1 Star2 Stars3 Stars4 Stars5 Stars (6 votes, average: 3.17 out of 5)
Loading...

Audio fingerprinting and recognition algorithm implemented in Python, see the explanation here: How it works Dejavu can memorize audio by listening to it once and fingerprinting it. Then by playing a song and recording microphone input, Dejavu attempts to match the audio against the fingerprints held in the database, returning the song being played. Note that for voice recognition, Dejavu is not the right tool! Dejavu excels at recognition of exact signals with reasonable amounts of noise. Installation and Dependencies: Read INSTALLATION.md Setup First, install the above dependencies. Second, you’ll need to create a MySQL database where Dejavu can store fingerprints. […]