Skip to content

Instantly share code, notes, and snippets.

View d3fc0nmm's full-sized avatar
😀

Miguel d3fc0nmm

😀
  • Tec-Refresh, Inc.
  • Southern California
View GitHub Profile
#!/bin/bash
#
# All the credit to Forescout - https://www.forescout.com/
#
vercomp () {
if [[ $1 == $2 ]]
then
return 0
<#
.SYNOPSIS
log4j-search.ps1 scans all local drives for presence of log4j jar files and analyzes the contents of the jar file to determine if it is vulnerable (CVE-2021-44228 and CVE-2021-45105)
.DESCRIPTION
Requires .Net4+
Scans your local drives to identify vulnerable jar files (CVE-2021-44228 and CVE-2021-45105)
USAGE
.\log4j-search.ps1
.\log4j-search.ps1 -verbose 1 #lists all matching log4j jar files
@d3fc0nmm
d3fc0nmm / ShellcodeTest.cs
Created March 20, 2021 09:57 — forked from TheWover/ShellcodeTest.cs
Dirty but working C# remote shell code injector. Injects into explorer using the architecture of the platform. Modified from several random sources and cleaned up a bit.
/* Author: TheWover
Description: Injects embedded base64-encoded shellcode into an arbitrary hardcoded process using native Windows 32 API calls.
Last Modified: 11/1/2018
*/
using System;
using System.Diagnostics;
using System.Runtime.InteropServices;
namespace ShellcodeTest