Skip to content

Instantly share code, notes, and snippets.

View d3fc0nmm's full-sized avatar

Miguel d3fc0nmm

  • Tec-Refresh, Inc.
  • Southern California
View GitHub Profile
# All the credit to Forescout -
vercomp () {
if [[ $1 == $2 ]]
return 0
log4j-search.ps1 scans all local drives for presence of log4j jar files and analyzes the contents of the jar file to determine if it is vulnerable (CVE-2021-44228 and CVE-2021-45105)
Requires .Net4+
Scans your local drives to identify vulnerable jar files (CVE-2021-44228 and CVE-2021-45105)
.\log4j-search.ps1 -verbose 1 #lists all matching log4j jar files
d3fc0nmm / ShellcodeTest.cs
Created March 20, 2021 09:57 — forked from TheWover/ShellcodeTest.cs
Dirty but working C# remote shell code injector. Injects into explorer using the architecture of the platform. Modified from several random sources and cleaned up a bit.
/* Author: TheWover
Description: Injects embedded base64-encoded shellcode into an arbitrary hardcoded process using native Windows 32 API calls.
Last Modified: 11/1/2018
using System;
using System.Diagnostics;
using System.Runtime.InteropServices;
namespace ShellcodeTest