This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#----------------------------------------------------------------------------------------------------------------------- | |
# PHROZEN SAS (c) 2018 - www.phrozen.io | |
# Jean-Pierre LESUEUR ([email protected]) | |
# | |
# Name : File2Batch | |
# Description : File Binder (Wrapper) only using Batch commands (.BAT output extension) | |
# Category : Malware Research | |
# Version : 0.1 (07/02/2018) | |
# Target OS : Windows XP->Windows 10 (32/64bit) | |
# License : MIT |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
uses ActiveX, ShlObj, ComObj; | |
// ... | |
function MaliciousLnk(fileUrl, destFile : String) : Boolean; | |
var cObject : IUnknown; | |
shellLink : IShellLink; | |
PFile : IPersistFile; | |
LinkName : string; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#----------------------------------------------------------------------------------------------------------------------- | |
# PHROZEN SAS (c) 2018 - www.phrozen.io | |
# Jean-Pierre LESUEUR ([email protected]) | |
# | |
# Name : File2CmdLine | |
# Description : Conv a small file to a single line command. When executed the file is extracted and executed. | |
# Category : Malware Research | |
# Version : 1 (27/04/2017) | |
# Target OS : Windows XP->Windows 10 (32/64bit) | |
# License : MIT |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{-----------------------------------------------------------------------------------------------------------------------} | |
{ PHROZEN SAS (c) 2018 - www.phrozen.io } | |
{ Jean-Pierre LESUEUR ([email protected]) } | |
{ } | |
{ Create a Windows Shortcut by code and inject a potential malicious single line command, for post extraction and } | |
{ execution. } | |
{-----------------------------------------------------------------------------------------------------------------------} | |
program Shortcut_gen; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#------------------------------------------------------------------------------- | |
# PHROZEN SAS (c) 2018 - www.phrozen.io | |
# Jean-Pierre LESUEUR ([email protected]) | |
# | |
# Name : File2Lnk | |
# Description : File Binder (Wrapper) using Microsoft Windows Shortcuts (.LNK) | |
# Category : Malware Research | |
# Version : 0.1 (26/05/2018) | |
# Target OS : Microsoft Windows (32/64 bit) | |
# License : MIT |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/perl | |
use strict; | |
use warnings; | |
use CGI qw(); | |
my $cgi = CGI->new(); | |
print "Cache-Control: no-cache\n"; | |
print "Content-type: text/plain\n\n"; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Exploit: OpenSSH 7.7 - Username Enumeration | |
# Author: Justin Gardner | |
# Date: 2018-08-20 | |
# Software: https://ftp4.usa.openbsd.org/pub/OpenBSD/OpenSSH/openssh-7.7.tar.gz | |
# Affected Versions: OpenSSH version < 7.7 | |
# CVE: CVE-2018-15473 | |
# | |
# Modified version by Jean-Pierre LESUEUR (@darkcodersc) 04/11/2019 | |
# --> Support Python3 | |
# --> Removed export functions |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# -*- coding: utf-8 -*- | |
''' | |
distccd v1 RCE (CVE-2004-2687) | |
This exploit is ported from a public Metasploit exploit code : | |
https://www.exploit-db.com/exploits/9915 | |
The goal of that script is to avoid using Metasploit and to do it manually. (OSCP style) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
(* | |
Jean-Pierre LESUEUR | |
@DarkCoderSc | |
https://www.phrozen.io/ | |
Note: This code is a bit old and could be optimized. Feel free to do so ;) | |
*) | |
function BufferToHexView(ABuffer : PVOID; ABufferSize : Int64; pLastOffset : PNativeUINT = nil; AStartOffset : NativeUINT = 0) : String; | |
var ARows : DWORD; | |
i, n : integer; | |
AVal : Byte; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<#------------------------------------------------------------------------------- | |
.Developer | |
Jean-Pierre LESUEUR (@DarkCoderSc) | |
https://www.twitter.com/darkcodersc | |
https://github.com/DarkCoderSc | |
www.phrozen.io | |
[email protected] | |
PHROZEN | |
.License | |
Apache License |
OlderNewer