Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.
$ python -m SimpleHTTPServer 8000
Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.
$ python -m SimpleHTTPServer 8000
// | |
// based on https://git.lekensteyn.nl/peter/wireshark-notes/tree/src/ | |
// Licensed under the terms of GPLv3 (or any later version) at your choice | |
// | |
// works for daemons which can be run in the foreground | |
// | |
// gcc nccsslpasswdlog.c -shared -o nccsslpasswdlog.so -fPIC -ldl | |
// | |
// | |
$.fn.crossDomainRequest = function(url, method, data, fn) { | |
var self = this; | |
var receiver = self.attr('src').replace(/\/.*$/, '').replace(/^https?::\/\//, ''); | |
function get(event) { | |
if (event.origin.match(receiver)) { | |
// event.data is response from POST | |
fn(event.data); | |
} | |
} | |
if (window.addEventListener){ |
/* | |
-------- dllinjshim.cpp -------- | |
> cl /Fe:dllinjshim.exe dllinjshim.cpp | |
> dllinjshim.exe | |
> sdbinst moo.sdb | |
/!\ On Windows 10 there is a new function `SdbIsKnownShimDll` called | |
in `SdbGetDllPath` which will check the DLL name against the following list: |
Steps to install Metasploit on Windows 10 using the Windows Subsystem for Linux | |
1.) Enable Developer Mode | |
C:\> reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppModelUnlock" /t REG_DWORD /f /v "AllowDevelopmentWithoutDevLicense" /d "1" | |
2.) Enable Windows Subsystem for Linux | |
C:\> DISM /online /enable-feature /featurename:Microsoft-Windows-Subsystem-Linux | |
3.) Reboot |
/* SMBLoris attack proof-of-concept | |
* | |
* Copyright 2017 Hector Martin "marcan" <[email protected]> | |
* | |
* Licensed under the terms of the 2-clause BSD license. | |
* | |
* This is a proof of concept of a publicly disclosed vulnerability. | |
* Please do not go around randomly DoSing people with it. | |
* | |
* Tips: do not use your local IP as source, or if you do, use iptables to block |
# Example: ls 'C:\Windows\System32\*' -Include '*.dll' | Get-AuthenticodeSignature | Select -ExpandProperty SignerCertificate | Get-TBSHash | |
filter Get-TBSHash { | |
[OutputType([String])] | |
param ( | |
[Parameter(Mandatory, ValueFromPipeline)] | |
[Security.Cryptography.X509Certificates.X509Certificate2] | |
$Certificate | |
) |
#include "stdafx.h" | |
#include <windows.h> | |
#include <Winbase.h> | |
#include <Wtsapi32.h> | |
#include <Userenv.h> | |
#include <malloc.h> | |
#pragma comment(lib, "Wtsapi32.lib") | |
#pragma comment(lib, "Userenv.lib") |
import sys | |
import windows | |
import windows.winproxy | |
import windows.generated_def as gdef | |
# List distro: wslconfig /l | |
class WSLAPIProxy(windows.winproxy.ApiProxy): | |
APIDLL = "wslapi" | |
default_error_check = staticmethod(windows.winproxy.no_error_check) |