Skip to content

Instantly share code, notes, and snippets.

Parse the kubernetes manifest in yaml or json, don't care a manifest type.

Examples:

package main

import (
	"bytes"
	"context"
@Dliv3
Dliv3 / main.cpp
Created February 8, 2025 03:40 — forked from monoxgas/main.cpp
Adapative DLL Hijacking - Stability Hooking
#include <Windows.h>
#include <intrin.h>
#include <string>
#include <TlHelp32.h>
#include <psapi.h>
DWORD WINAPI Thread(LPVOID lpParam) {
// Insert evil stuff
ExitProcess(0);
b1345e1ab70983888c72a3ffb7143fd7cdee9c03502247c3ab50d5e9245f90b8
666d81257cca145b1853660f38d05347364b2e31b072deb59180746ca3f5f099
@Dliv3
Dliv3 / 2024_04_26_3.txt
Created April 26, 2024 08:38
Windows LPE 3
77ac40da30d6940147b34b9454949b3fdbc9e780cdfd8ea62ad78ff972592cad
@Dliv3
Dliv3 / 2024_04_26_2.txt
Created April 26, 2024 08:37
WIndows LPE 2
5e19673782c2e334d8cc4b36299b0a054d2bec5827b8efe6da8917fbb40b7e1e
@Dliv3
Dliv3 / 2024_04_26.txt
Last active April 26, 2024 08:36
Windows LPE
dc7e3c839ad9ce5194a2d6977c12cbd590a59e68788d20f17566ac860ec163dd
bdacb3823320a5c7a630f513dfa981a7f5abacf6bdffc990a90615d37da0101c
@Dliv3
Dliv3 / Source.cpp
Created December 7, 2023 10:35 — forked from mgeeky/Source.cpp
Thread Execution via NtCreateWorkerFactory
#include <Windows.h>
#include <winternl.h>
#include <stdio.h>
#define WORKER_FACTORY_FULL_ACCESS 0xf00ff
// https://github.com/winsiderss/systeminformer/blob/17fb2e0048f062a04394c4ccd615b611e6ffd45d/phnt/include/ntexapi.h#LL1096C1-L1115C52
typedef enum _WORKERFACTORYINFOCLASS
{
WorkerFactoryTimeout, // LARGE_INTEGER
@Dliv3
Dliv3 / decryptKerbTicket.py
Created July 30, 2023 05:47 — forked from tothi/decryptKerbTicket.py
Decrypt kerberos tickets and parse out authorization data
#!/usr/bin/env python3
# NOTE: this script was created for educational purposes to assist learning about kerberos tickets.
# Likely to have a few bugs that cause it to fail to decrypt some TGT or Service tickets.
#
# Recommended Instructions:
# Obtain valid kerberos tickets using Rubeus or mimikatz "sekurlsa::tickets /export"
# Optionally convert tickets to ccache format using kekeo "misc::convert ccache <ticketName.kirbi>"
# Obtain appropriate aes256 key using dcsync (krbtgt for TGT or usually target computer account for Service Ticket)
# Run this script to decrypt:
# ./decryptKerbTicket.py -k 5c7ee0b8f0ffeedbeefdeadbeeff1eefc7d313620feedbeefdeadbeefafd601e -t ./[email protected][email protected]