This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| /* | |
| Author: Arno0x0x, Twitter: @Arno0x0x | |
| DO NOT COMPILE THIS SOURCE FILE ! | |
| Encode this source in base64: | |
| base64 -w0 malicious.cs > malicious.b64 | |
| Then paste it in the code in "not_detected.cs" source file |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| .NET and COM: The Complete Interoperability Guide | |
| @War: The Rise of the Military-Internet Complex | |
| 21st Century C: C Tips from the New School | |
| 3D Math Primer for Graphics and Game Development (Wordware Game Math Library) | |
| A Guide to Claims-Based Identity and Access Control (Microsoft patterns & practices) | |
| A Guide to Kernel Exploitation: Attacking the Core | |
| A More Beautiful Question: The Power of Inquiry to Spark Breakthrough Ideas | |
| A Primer of Analytic Number Theory: From Pythagoras to Riemann | |
| Absolute FreeBSD, 2nd Edition: The Complete Guide to FreeBSD | |
| Advanced C and C++ Compiling |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # Converter.sh by @xdavidhu | |
| # This is a script inspired by the Bug Hunter's Methodology 3 by @Jhaddix | |
| # With this script, you can convert domain lists to resolved IP lists without duplicates. | |
| # Usage: ./converter.sh [domain-list-file] [output-file] | |
| echo -e "[+] Converter.sh by @xdavidhu\n" | |
| if [ -z "$1" ] || [ -z "$2" ]; then | |
| echo "[!] Usage: ./converter.sh [domain-list-file] [output-file]" | |
| exit 1 | |
| fi |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| // demoshell is a nifty beaconing shell useful for demos | |
| package main | |
| /* | |
| * demoshell.go | |
| * Simple reverse shell used in demos | |
| * By J. Stuart McMurray | |
| * Created 20180331 | |
| * Last Modified 20180331 | |
| */ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| powershell.exe -Command "Start-Process -Verb open calc" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| function Invoke-Phant0m { | |
| <# | |
| .SYNOPSIS | |
| This script walks thread stacks of Event Log Service process (spesific svchost.exe) and identify | |
| Event Log Threads to kill Event Log Service Threads. So the system will not be able to collect | |
| logs and at the same time the Event Log Service will appear to be running. I have made this script | |
| for two reasons. First, This script will help to Red Teams and Penetration Testers. Second, I | |
| want to learn Powershell and Low-Level things on Powershell for cyber security field. | |
| .DESCRIPTION |