Skip to content

Instantly share code, notes, and snippets.

View heyibrahimkhan's full-sized avatar

Ibrahim Ali Khan heyibrahimkhan

View GitHub Profile
@ruevaughn
ruevaughn / 1_top+hacker_methodologies.md
Last active November 29, 2025 13:15
Hacker Methodologies & Tools (NEW)

The Top Hacker Methodologies & Tools Notes

Nuclei Templates

Concrete5 CMS : Identification, Mass Hunting, Nuclei Template Writing & Reporting


@iann0036
iann0036 / gist:b473bbb3097c5f4c656ed3d07b4d2222
Last active November 14, 2025 12:59
List of expensive / long-term effect AWS IAM actions
acm-pca:CreateCertificateAuthority
aws-marketplace:AcceptAgreementApprovalRequest
aws-marketplace:Subscribe
backup:PutBackupVaultLockConfiguration
bedrock:CreateProvisionedModelThroughput
bedrock:UpdateProvisionedModelThroughput
devicefarm:PurchaseOffering
dynamodb:PurchaseReservedCapacityOfferings
ec2:ModifyReservedInstances
ec2:PurchaseCapacityBlock
@Anon-Exploiter
Anon-Exploiter / commands.matlab
Last active April 28, 2023 18:50
Creating CS:GO server with skins, ws, gloves, knifes, etc. on a Ubuntu Instance
sudo apt-get -y update && \
sudo apt-get -y upgrade && \
sudo apt install software-properties-common && \
sudo add-apt-repository multiverse && \
sudo dpkg --add-architecture i386 && \
sudo apt-get -y update && \
sudo apt-get -y upgrade && \
sudo systemctl reboot
sudo apt-get -y install steamcmd && \
@MSAdministrator
MSAdministrator / iranian_apit_groups_possible_commands.md
Last active December 5, 2025 00:25
Iranian APT Groups & Possible Commands Used By These Groups

Overview

The following content is generated using a preview release of Swimlane's pyattck.

This snippet of data is scoped to the following actor groups:

  • APT33
  • APT34
  • APT39
  • Charming Kitten
@0xtf
0xtf / tlp-colors
Last active September 14, 2024 00:55
TLP classification colors in HEX/HTML
TLP:RED #FF2B2B
TLP:AMBER #ffc000
TLP:GREEN #33ff00
TLP:WHITE #ffffff
@xrman
xrman / gist:4468f545b169969466bceb694d742dad
Created March 12, 2019 21:47
FastStone Capture Full Serial Key
Registration Code
Name : www.xyraclius.com
Serial : OOCRYIMDMDPWRETFPSUZ
// ==UserScript==
// @name Telegram Script
// @author thefabledowl@gmail.com
// @version 0.3
// @description Greasemonkey script to extract users/history
// @author You
// @downloadUrl https://gist.github.com/fabledowl/4d6f84b211a2918fb9ee9556550df5b0/raw/telegramScript.user.js
// @updateUrl https://gist.github.com/fabledowl/4d6f84b211a2918fb9ee9556550df5b0/raw/telegramScript.user.js
// @include https://web.telegram.org/*
// @grant none
// ==UserScript==
// @name Telegram - Get Users
// @author thefabledowl@gmail.com
// @desription Greasemonkey script to extract users from Telegram groups
// @namespace https://fabledowlblog.wordpress.com/
// @include https://web.telegram.org/*
// @downloadUrl https://gist.github.com/fabledowl/8c8db5858e096866c42dfa114034f0f2/raw/getUsers.user.js
// @updateUrl https://gist.github.com/fabledowl/8c8db5858e096866c42dfa114034f0f2/raw/getUsers.user.js
// @version 0.4
// @grant none
@jaredcatkinson
jaredcatkinson / Get-InjectedThread.ps1
Last active October 14, 2025 02:45
Code from "Taking Hunting to the Next Level: Hunting in Memory" presentation at SANS Threat Hunting Summit 2017 by Jared Atkinson and Joe Desimone
function Get-InjectedThread
{
<#
.SYNOPSIS
Looks for threads that were created as a result of code injection.
.DESCRIPTION
<Sysmon schemaversion="4.32">
<!-- Capture all hashes -->
<HashAlgorithms>*</HashAlgorithms>
<DnsLookup>False</DnsLookup>
<ArchiveDirectory>Archive</ArchiveDirectory>
<EventFiltering>
<RuleGroup name="" groupRelation="or">
<!-- Event ID 1 == Process Creation. Log all newly created processes except -->
<ProcessCreate onmatch="exclude">
<Image condition="contains">splunk</Image>