Standard escape codes are prefixed with Escape
:
- Ctrl-Key:
^[
- Octal:
\033
- Unicode:
\u001b
- Hexadecimal:
\x1B
- Decimal:
27
''' | |
IDA plugin to display the calls and strings referenced by a function as hints. | |
Installation: put this file in your %IDADIR%/plugins/ directory. | |
Author: Willi Ballenthin <[email protected]> | |
Licence: Apache 2.0 | |
''' | |
import idc | |
import idaapi | |
import idautils |
import struct , sys , pefile , validators , re , base64 | |
from capstone import * | |
from capstone.x86 import * | |
''' | |
Author: Mohamed Ashraf (@X__Junior) | |
Usage: | |
python3 Statc_Stealer.py path_to_sample | |
''' |
#Requires -Version 5.1 | |
Set-StrictMode -Version 'latest' | |
$ErrorActionPreference = 'stop' | |
if ( !(Test-Path -Path 'Variable:lolDriversJson' -PathType Leaf) ) { | |
[datetime]::Now.ToString('o') | Write-Host -ForegroundColor Cyan | |
'downloading lolJdriver JSON' | Write-Host -ForegroundColor Cyan | |
$lolDriversJson = Invoke-RestMethod -Method Get -Uri 'https://www.loldrivers.io/api/drivers.json' | |
} |
# Simple script to check drivers in C:\windows\system32\drivers against the loldrivers list | |
# Author: Oddvar Moe - @oddvar.moe | |
$drivers = get-childitem -Path c:\windows\system32\drivers | |
$web_client = new-object system.net.webclient | |
$loldrivers = $web_client.DownloadString(" https://www.loldrivers.io/api/drivers.json") | ConvertFrom-Json | |
Write-output("Checking {0} drivers in C:\windows\system32\drivers against loldrivers.io json file" -f $drivers.Count) | |
foreach ($lol in $loldrivers.KnownVulnerableSamples) | |
{ |
# Simple script to check drivers in C:\windows\system32\drivers against the loldrivers list | |
# Author: Oddvar Moe - @oddvar.moe | |
$drivers = get-childitem -Path c:\windows\system32\drivers | |
$web_client = new-object system.net.webclient | |
$loldrivers = $web_client.DownloadString(" https://www.loldrivers.io/api/drivers.json") | ConvertFrom-Json | |
Write-output("Checking {0} drivers in C:\windows\system32\drivers against loldrivers.io json file" -f $drivers.Count) | |
foreach ($lol in $loldrivers.KnownVulnerableSamples) | |
{ |
#include <Core.h> | |
#include <Win32.h> | |
#include <Structs.h> | |
#include <Sleep.h> | |
#include <Utils.h> | |
SEC( text, C ) VOID Ekko ( DWORD SleepTime, PINSTANCE Instance) | |
{ |
#include <Windows.h> | |
#include <stdio.h> | |
#define PRINTDEBUG(fmt, ...) printf(fmt "\n", ##__VA_ARGS__) | |
#define NT_SUCCESS(Status) ((NTSTATUS)(Status) >= 0) | |
#define WORKER_FACTORY_FULL_ACCESS 0xf00ff | |
typedef struct _UNICODE_STRING { |
# | |
# ROGUE | |
# | |
# GuidePoint Security LLC | |
# | |
# Threat and Attack Simulation Team | |
# | |
import os | |
import sys | |
import click |