Skip to content

Instantly share code, notes, and snippets.

View cutaway's full-sized avatar
🦺
Going forth, doing good things.

Don C. Weber cutaway

🦺
Going forth, doing good things.
View GitHub Profile
@cutaway
cutaway / offline_python_install.md
Last active December 5, 2025 14:55
Python Offline Install Windows, Ubuntu, and Kali

OT / ICS Python Testing & Challenge Requirements (USB Transfer Only)

This section defines the minimum Python modules and system dependencies required to support:

  • OT protocol testing
  • ICS traffic analysis
  • Control system security challenges
  • Adversary emulation in cyber ranges
  • Engineering workstation simulation
@cutaway
cutaway / bh_ce_docker_setup.md
Created December 11, 2024 18:02
Bloodhound CE Docker Setup Directions
@cutaway
cutaway / bh_jq_queries.md
Last active December 11, 2024 17:46
Bloodhound JSON Queries Using JQ

Started here to manually parse Bloodhound Data with JQ to Create Lists of Potentially Vulnerable Users and Computers

Get JQ for Windows

Windows jq is an executable that is downloaded and the download is JUST the executable and not an installer. For these examples the executable has been moved to the local directory and renamed 'jq.exe'.

Get jq: https://jqlang.github.io/jq/

Summary List of Commands

Set contents to a variable

@cutaway
cutaway / Get-ServicesExePerms.ps1
Created July 23, 2024 15:20
Test the permissions for the service executables and directories.
########################
# Get-ServicesExePerms.ps1: Test the permissions for the service executables and directories.
# Author: Don C. Weber (cutaway)
# Date: 20240723
#
########################
$sf = (Get-CimInstance -ClassName Win32_Service).PathName | ForEach-Object { ( ( ( $_ -Split '.exe' )[0] -replace '^"') + '.exe' ).tolower() } | Sort-Object | Get-Unique | ForEach-Object { if ( Test-Path -Path "$_" -PathType Leaf ) { $_ } }
#$rights = @("FullControl","Modify","Write","Read","ReadAndExecute","Synchronize")
@cutaway
cutaway / Sim-PSEncFiles.ps1
Created July 21, 2024 23:38
This PS script will encrypt all of the files in a target folder to a selected location.
######################
# Sim-PSEncFiles.ps1: Simulate file encrption using PSRemoting
# Purpose: This PS script will encrypt all of the files in a target
# folder to a selected location. The purpose of this script
# is to perform actions similar to the actions performed by
# ransomware. These actions will touch a large number of files,
# create new files with different extension, and encrypt the
# file to a new location. The original file is not modified
#
# Author: Don C. Weber (cutaway)
@cutaway
cutaway / gist:8d44fa81fafab86fae8d0ed8f0a473bc
Created February 4, 2022 06:09
Mitmdump SSL Creds Dumper
from mitmproxy import http
import paramiko
# Original Example: https://stackoverflow.com/questions/27369144/use-mitmproxy-to-translate-a-form-key-value-to-a-body-post
DEBUG = False
#DEBUG = True
class GetRTUCreds:
localhost = '127.0.0.1'
@cutaway
cutaway / disable_windows_defender_powershell.txt
Created June 26, 2021 18:34
Disable Windows Defender Powershell
Disable Windows Defender
NOTE: These settings may be permeant.
• Get-MpComputerStatus
• Set-MpPreference -DisableRealtimeMonitoring $true
• Set-MpPreference -DisableBehaviorMonitoring $true
• Set-MpPreference -DisableIntrusionPreventionSystem $true
• Set-MpPreference -DisableIOAVProtection $true
• Set-MpPreference -DisableScriptScanning $true
• Get-MpComputerStatus
###########################
# Bash ~/.bashrc
###########################
function CONPS() {
n=$1
export PS1='\n$n \D{%F %T}\n> '
}
alias consult00='CONPS Consult00; cd ~/Documents/consult00'
@cutaway
cutaway / iptables_monitor.sh
Created December 16, 2020 20:32
Script to use IPTables to prevent outbound traffic when using network taps and monitoring network traffic.
#!/bin/bash
ipt4='/sbin/iptables'
ipt6='/sbin/ip6tables'
for i in $ipt4 $ipt6; do
# Flush Rules
echo 'Flushing IPTables: ' $i
$i -F
$i -X