Skip to content

Instantly share code, notes, and snippets.

View ShashankKumarSaxena's full-sized avatar
🎯
Stuck in shells ~#

Shashank Saxena ShashankKumarSaxena

🎯
Stuck in shells ~#
View GitHub Profile
@ShashankKumarSaxena
ShashankKumarSaxena / invoke-shellcode.ps1
Created April 27, 2024 10:05 — forked from xpn/invoke-shellcode.ps1
Calls invoke-shellcode.ps1 upon load with a reverse meterpreter shell, and connects to meterpreter.local on port 443
function Invoke-Shellcode
{
<#
.SYNOPSIS
Inject shellcode into the process ID of your choosing or within the context of the running PowerShell process.
PowerSploit Function: Invoke-Shellcode
Author: Matthew Graeber (@mattifestation)
License: BSD 3-Clause
@ShashankKumarSaxena
ShashankKumarSaxena / moderation.py
Last active January 13, 2021 08:20 — forked from jpanahon/moderation.py
An advanced moderation cog for the rewrite branch of discord.py
import discord
from discord.ext import commands
# This prevents staff members from being punished
class Sinner(commands.Converter):
async def convert(self, ctx, argument):
argument = await commands.MemberConverter().convert(ctx, argument) # gets a member object
permission = argument.guild_permissions.manage_messages # can change into any permission
if not permission: # checks if user has the permission
return argument # returns user object