Skip to content

Instantly share code, notes, and snippets.

Avatar

multiplex3r multiplex3r

View GitHub Profile
View keybase.md

Keybase proof

I hereby claim:

  • I am multiplex3r on github.
  • I am multiplex3r (https://keybase.io/multiplex3r) on keybase.
  • I have a public key whose fingerprint is DFDF F47F 4C00 076C 2C82 A834 6716 6CA8 F415 CCB5

To claim this, I am signing this object:

@multiplex3r
multiplex3r / popup.c
Created Aug 31, 2017
Replacement for calc.exe in wine :)
View popup.c
#include <windows.h>
#include <winbase.h>
void main(){
MessageBox(0,"You have been pwnd!","Pwnd!",1);
}
@multiplex3r
multiplex3r / harness.c
Created Aug 31, 2017
Shellcode harness
View harness.c
#include <windows.h>
unsigned char buf[] =
"your"
"shellcode"
"here";
void executePayload(){
DWORD pewpewpew;
VirtualProtect(buf, sizeof(buf),PAGE_EXECUTE_READWRITE, &pewpewpew);
@multiplex3r
multiplex3r / encoder.py
Created Aug 31, 2017
Shellcode encoder
View encoder.py
#!/usr/bin/env python
import sys
def chunks(l, n):
for i in range(0, len(l), n):
yield l[i:i + n]
shellcode = "your"
shellcode += "shellcode"
shellcode += "here"
@multiplex3r
multiplex3r / enc_harness.c
Created Aug 31, 2017
Decrypt and execute harness
View enc_harness.c
#include <windows.h>
unsigned char buf[] =
"your"
"encrypted"
"shellcode"
"here";
char* decryptPayload(){
@multiplex3r
multiplex3r / loadPcap.py
Last active Sep 13, 2022
Load a PCAP into neo4j with scapy
View loadPcap.py
#!/usr/bin/env python3
from scapy.all import *
from py2neo import Graph, Node, Relationship
packets = rdpcap("<your_pcap_file>")
g = Graph(password="<your_neo4j_password>")
for packet in packets.sessions():
pkt = packet.split()