This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
using Microsoft.Extensions.Logging; | |
using System; | |
namespace Masticore | |
{ | |
/// <summary> | |
/// Utility class for logging | |
/// </summary> | |
public static class LogUtils | |
{ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// Dll Hijacking via Thread Creation | |
// Author - Vivek Ramachandran | |
// Learn Pentesting Online -- http://PentesterAcademy.com/topics and http://SecurityTube-Training.com | |
// Free Infosec Videos -- http://SecurityTube.net | |
#include <windows.h> | |
#define SHELLCODELEN 2048 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
REM Batch script for generating a dummy file using fsutil | |
REM Dummy files have no functionality or purpose alone | |
REM They're however very useful for testing, debugging or benchmarking | |
REM You could for example benchmark and compare 7-Zip vs WinRAR performance | |
@echo OFF | |
chcp 65001 | |
setlocal EnableDelayedExpansion | |
SET size2=a | |
SET "size2=!size2:a=>!" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Windows Registry Editor Version 5.00 | |
[HKEY_CLASSES_ROOT\Directory\Background\shell\OpenWithCMD] | |
@="Open with CMD" | |
"Icon"="C:\\WINDOWS\\system32\\cmd.exe" | |
[HKEY_CLASSES_ROOT\Directory\Background\shell\OpenWithCMD\command] | |
@="cmd.exe /k cd %V" | |
[HKEY_CLASSES_ROOT\Directory\shell\OpenWithCMD] |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
cscript.exe %windir%\system32\slmgr.vbs /rilc | |
cscript.exe %windir%\system32\slmgr.vbs /upk | |
cscript.exe %windir%\system32\slmgr.vbs /ckms | |
cscript.exe %windir%\system32\slmgr.vbs /cpky | |
cscript.exe %windir%\system32\slmgr.vbs /ipk VK7JG-NPHTM-C97JM-9MPGT-3V66T | |
sc config LicenseManager start= auto & net start LicenseManager | |
sc config wuauserv start= auto & net start wuauserv | |
clipup -v -o -altto c:\ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Using B-spline for simulate humane like mouse movments | |
def human_like_mouse_move(self, action, start_element): | |
points = [[6, 2], [3, 2],[0, 0], [0, 2]]; | |
points = np.array(points) | |
x = points[:,0] | |
y = points[:,1] | |
t = range(len(points)) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* | |
* Example of simple execve('/bin/sh', ...); shellcode compiled | |
* and embedded within C program, then compiled on 64-bit with NX bit | |
* turned off and set executable stack. | |
* | |
* Compilation: | |
* $ gcc -fno-stack-protector -z execstack execve1.c -o execve1c | |
*/ | |
/* |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function Invoke-PsExec { | |
<# | |
.SYNOPSIS | |
This function is a rough port of Metasploit's psexec functionality. | |
It utilizes Windows API calls to open up the service manager on | |
a remote machine, creates/run a service with an associated binary | |
path or command, and then cleans everything up. | |
Either a -Command or a custom -ServiceEXE can be specified. | |
For -Commands, a -ResultsFile can also be specified to retrieve the |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
# Code that quickly generates a deployable .war for a PowerShell one-liner | |
import zipfile | |
import StringIO | |
import sys | |
def generatePsWar(psCmd, appName): |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Function Invoke-HostFile { | |
<# | |
.SYNOPSIS | |
Hosts a base64 string representation of a binary file or a given | |
$FilePath on the specified $Port. Any HTTP request to the given | |
host/port will return the binary data of the specified file. | |
.PARAMETER Base64File | |