Skip to content

Instantly share code, notes, and snippets.

View mgeeky's full-sized avatar
💭
Wanna sip a sencha?

Mariusz Banach mgeeky

💭
Wanna sip a sencha?
View GitHub Profile
@mgeeky
mgeeky / acs.py
Created March 16, 2026 22:10 — forked from HackingLZ/acs.py
Standalone Azure Access Control Service (ACS) Domain Lookup
#!/usr/bin/env python3
"""
Standalone Azure Access Control Service (ACS) Domain Lookup
Queries the ACS metadata endpoint to extract domains associated with a tenant.
Accepts either a domain name or tenant GUID as input.
Usage:
python3 acs_lookup.py contoso.com
python3 acs_lookup.py ff13934a-ea67-4ad5-9552-dd16aad35221
@mgeeky
mgeeky / codex-researcher.md
Created March 16, 2026 13:23 — forked from sherifkozman/codex-researcher.md
codex-researcher: A Claude Code sub-agent that uses OpenAI Codex CLI for conducting research

name: codex-researcher description: > Use this agent when you need to conduct research on any topic using OpenAI's Codex CLI. This includes gathering information about technologies, companies, market trends, scientific topics, historical events, or any subject requiring in-depth analysis. The agent leverages the codex exec command with web search to perform comprehensive research. model: inherit color: green

@mgeeky
mgeeky / windows-11-ioctls.cpp
Created February 25, 2026 19:28 — forked from daaximus/windows-11-ioctls.cpp
Windows 11 26100 All IOCTL List
; ioctl codes extracted
; daax (2026) -- win 11 26100
;
#pragma once
#include <stdint.h>
typedef struct _ioctl_t {
const char* ioctl_name;
@mgeeky
mgeeky / microgpt.py
Created February 14, 2026 19:56 — forked from karpathy/microgpt.py
microgpt
"""
The most atomic way to train and inference a GPT in pure, dependency-free Python.
This file is the complete algorithm.
Everything else is just efficiency.
@karpathy
"""
import os # os.path.exists
import math # math.log, math.exp
@mgeeky
mgeeky / pic-and-string-literals-2.md
Created February 5, 2026 13:02 — forked from EvanMcBroom/pic-and-string-literals-2.md
Pic and String Literals Part 2

PIC and String Literals Part 2

I previously wrote about how to use macro metaprogramming to simplify using string literals in position independent code (PIC). The results are summarized in the below code snippet and the article can be read on GitHub.

void f() {
    // Example 1: The Pic idiom for instantiating a string
    char picString1[]{ 'a', 'b', 'c' };
@mgeeky
mgeeky / disable-defender.bat
Created November 25, 2025 17:45 — forked from garoto/disable-defender.bat
Disable Windows Defender scripts
@echo off
rem A modified version of the disable defender script from: https://pastebin.com/kYCVzZPz
@echo on
rem ==========================================
rem This section will Disable Windows Defender
rem You can ignore error messages
rem 1 - Disable Real-time protection
reg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f
reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f
rem USE AT OWN RISK AS IS WITHOUT WARRANTY OF ANY KIND !!!!!
rem https://technet.microsoft.com/en-us/itpro/powershell/windows/defender/set-mppreference
rem To also disable Windows Defender Security Center include this
rem reg add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f
rem 1 - Disable Real-time protection
reg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f
reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f
reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f
reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f
@mgeeky
mgeeky / panw-exclusions.json
Created September 21, 2025 14:33 — forked from UNC1739/panw-exclusions.json
Default TLS Exclusions for Palo Alto Networks Firewalls
{
"type": "rpc",
"tid": "32",
"action": "PanDirect",
"method": "execute",
"predefinedCacheUpdate": "false",
"cloudCacheUpdate": "false",
"result": {
"result": {
"entry": [
@mgeeky
mgeeky / spoof.py
Created August 30, 2025 10:10 — forked from ustayready/spoof.py
Simple unfinished SMTP spoof script for use with Office365 DirectSend SmartHosts
import smtplib
from email.mime.text import MIMEText
from email.mime.multipart import MIMEMultipart
from email.mime.text import MIMEText
from email.mime.base import MIMEBase
from email import encoders
import ssl
import email
import argparse
@mgeeky
mgeeky / JasonToddIsTheBestRobin.c
Created August 23, 2025 08:15 — forked from whokilleddb/JasonToddIsTheBestRobin.c
Unnecessarily complicated way of controlling shellcode execution using InternetStatusCallback()
#include <windows.h>
#include <wininet.h>
#include <stdio.h>
#pragma comment(lib, "wininet.lib")
// notepad.exe shellcode
char shellcode[] = {
0xfc, 0x48, 0x83, 0xe4, 0xf0, 0xe8, 0xc0, 0x00, 0x00, 0x00, 0x41, 0x51, 0x41, 0x50, 0x52, 0x51,
0x56, 0x48, 0x31, 0xd2, 0x65, 0x48, 0x8b, 0x52, 0x60, 0x48, 0x8b, 0x52, 0x18, 0x48, 0x8b, 0x52,