Skip to content

Instantly share code, notes, and snippets.

View cwinfosec's full-sized avatar
🤖
becoming one with the machines

cwinfosec cwinfosec

🤖
becoming one with the machines
View GitHub Profile
@cwinfosec
cwinfosec / DynWin32-ReverseShell.ps1
Created January 29, 2022 23:09 — forked from qtc-de/DynWin32-ReverseShell.ps1
PowerShell reverse shell that uses dynamically resolved Win32 API functions
<#
DynWin32-ReverseShell.ps1 is a reverse shell based on dynamically looked up Win32 API calls.
The script uses reflection to obtain access to GetModuleHandle, GetProcAddress and CreateProcess.
Afterwards it uses GetModuleHandle and GetProcAddress to resolve the required WSA functions
from ws2_32.dll.
This script should be used for educational purposes only (and maybe while playing CTF :D).
It was only tested on Windows 10 (x64) and is probably not stable or portable. It's only
purpose is to demonstrate the usage of reflective lookups of Win32 API calls. See it as
@cwinfosec
cwinfosec / tmux-cheatsheet.markdown
Created November 23, 2020 17:33 — forked from MohamedAlaa/tmux-cheatsheet.markdown
tmux shortcuts & cheatsheet

tmux shortcuts & cheatsheet

start new:

tmux

start new with session name:

tmux new -s myname