I hereby claim:
- I am xpn on github.
- I am xpn (https://keybase.io/xpn) on keybase.
- I have a public key whose fingerprint is 6822 0B71 BB92 8ABC 8171 4C0F 6B0B E64F 9AF4 238C
To claim this, I am signing this object:
using System; | |
using System.Collections.Generic; | |
using System.Linq; | |
using System.Text; | |
using System.Threading.Tasks; | |
using System.Data; | |
using System.Data.SqlClient; | |
namespace metasploit_sql_test | |
{ |
I hereby claim:
To claim this, I am signing this object:
function Invoke-Shellcode | |
{ | |
<# | |
.SYNOPSIS | |
Inject shellcode into the process ID of your choosing or within the context of the running PowerShell process. | |
PowerSploit Function: Invoke-Shellcode | |
Author: Matthew Graeber (@mattifestation) | |
License: BSD 3-Clause |
#include <stdio.h> | |
#include <stdlib.h> | |
#include <string.h> | |
#include <libusb-1.0/libusb.h> | |
void printdev(libusb_device *dev) { | |
struct libusb_device_descriptor desc; | |
struct libusb_config_descriptor *config; | |
struct libusb_interface_descriptor *interdesc; |
#include <stdio.h> | |
#include <fcntl.h> | |
#include <unistd.h> | |
#include <string.h> | |
void print_success(void *input) { | |
if (*(char *)(input+1) == 'Y') { | |
printf("GOT: %s\n", input); | |
return; | |
} |
#!/usr/bin/env python | |
import sys | |
from ctypes import * | |
FILE_DEVICE_UNKNOWN = 0x00000022 | |
METHOD_BUFFERED = 0 | |
FILE_ANY_ACCESS = 0 | |
TC_MAX_PATH = 260 |
<? | |
phpinfo(); | |
?> |
# Radare2 r2pipe script to decode Meterpreters Single Byte XOR Countdown Encoder | |
# https://github.com/rapid7/metasploit-framework/blob/master/modules/encoders/x86/countdown.rb | |
import r2pipe | |
import sys | |
def dump(addr): | |
pass | |
def startEsil(): |
# r2pipe script using ESIL to decode the msfvenom jmp_call_additive XOR encoder | |
import r2pipe | |
import sys | |
def dump(addr): | |
pass | |
def startEsil(): | |
r.cmd('e io.cache=true') |
# r2pipe script using ESIL to decode the msfvenom x86/alpha_mixed encoder | |
import r2pipe | |
import sys | |
def dump(addr): | |
pass | |
def startEsil(): | |
r.cmd('e io.cache=true') |