Skip to content

Instantly share code, notes, and snippets.

View chvancooten's full-sized avatar
🕵️
Probably hacking

Cas van Cooten chvancooten

🕵️
Probably hacking
View GitHub Profile
@chvancooten
chvancooten / syscalls.h
Last active December 9, 2021 10:03
Failed attempt to get Syswhispers2 to work in Nim
#pragma once
// Code below is adapted from @modexpblog. Read linked article for more details.
// https://www.mdsec.co.uk/2020/12/bypassing-user-mode-hooks-and-direct-invocation-of-system-calls-for-red-teams
#ifndef SW2_HEADER_H_
#define SW2_HEADER_H_
#include <windows.h>
#include <winternl.h>
@chvancooten
chvancooten / openssl_decrypter.sh
Last active September 17, 2022 11:00
Simple OpenSSL Decryption Bruteforcer (HTB - Hawk)
#!/bin/bash
### 0xc4s OpenSSL bruter for HTB's 'Hawk'
# Declare wordlists
wordlist = '/usr/share/wordlists/rockyou.txt'
# Declare array of possible ciphers (based on common ones from 'openssl help')
ciphers=(
-aes-256-cbc
-aes-128-cbc