I hereby claim:
- I am xpn on github.
- I am xpn (https://keybase.io/xpn) on keybase.
- I have a public key whose fingerprint is 6822 0B71 BB92 8ABC 8171 4C0F 6B0B E64F 9AF4 238C
To claim this, I am signing this object:
| using System; | |
| using System.Collections.Generic; | |
| using System.Linq; | |
| using System.Text; | |
| using System.Threading.Tasks; | |
| using System.Data; | |
| using System.Data.SqlClient; | |
| namespace metasploit_sql_test | |
| { |
I hereby claim:
To claim this, I am signing this object:
| function Invoke-Shellcode | |
| { | |
| <# | |
| .SYNOPSIS | |
| Inject shellcode into the process ID of your choosing or within the context of the running PowerShell process. | |
| PowerSploit Function: Invoke-Shellcode | |
| Author: Matthew Graeber (@mattifestation) | |
| License: BSD 3-Clause |
| #include <stdio.h> | |
| #include <stdlib.h> | |
| #include <string.h> | |
| #include <libusb-1.0/libusb.h> | |
| void printdev(libusb_device *dev) { | |
| struct libusb_device_descriptor desc; | |
| struct libusb_config_descriptor *config; | |
| struct libusb_interface_descriptor *interdesc; |
| #include <stdio.h> | |
| #include <fcntl.h> | |
| #include <unistd.h> | |
| #include <string.h> | |
| void print_success(void *input) { | |
| if (*(char *)(input+1) == 'Y') { | |
| printf("GOT: %s\n", input); | |
| return; | |
| } |
| #!/usr/bin/env python | |
| import sys | |
| from ctypes import * | |
| FILE_DEVICE_UNKNOWN = 0x00000022 | |
| METHOD_BUFFERED = 0 | |
| FILE_ANY_ACCESS = 0 | |
| TC_MAX_PATH = 260 |
| <? | |
| phpinfo(); | |
| ?> |
| # Radare2 r2pipe script to decode Meterpreters Single Byte XOR Countdown Encoder | |
| # https://github.com/rapid7/metasploit-framework/blob/master/modules/encoders/x86/countdown.rb | |
| import r2pipe | |
| import sys | |
| def dump(addr): | |
| pass | |
| def startEsil(): |
| # r2pipe script using ESIL to decode the msfvenom jmp_call_additive XOR encoder | |
| import r2pipe | |
| import sys | |
| def dump(addr): | |
| pass | |
| def startEsil(): | |
| r.cmd('e io.cache=true') |
| # r2pipe script using ESIL to decode the msfvenom x86/alpha_mixed encoder | |
| import r2pipe | |
| import sys | |
| def dump(addr): | |
| pass | |
| def startEsil(): | |
| r.cmd('e io.cache=true') |