A single file that has 2 different ways of behaving
IN this case we simply load and compile 2 difference C# calls.
Use your imagination.
| <# | |
| Obtained from https://github.com/re4lity/subTee-gits-backups/blob/master/JEWebDav.ps1 | |
| #> | |
| <# | |
| .SYNOPSIS | |
| Simple Reverse Shell over HTTP. Deliver the link to the target and wait for connectback. | |
| Read And Write Files Over WebDAV Proof Of Concept |
| import math | |
| import time | |
| def gcd_factorial_efficient(n): | |
| """Compute GCD(sqrt(n)!, n) efficiently""" | |
| sqrt_n = int(math.sqrt(n)) | |
| g = n | |
| print(f"Computing GCD({sqrt_n}!, {n})") | |
| print(f"Processing {sqrt_n} numbers...\n") |
| using System; | |
| using System.Configuration; | |
| using System.IO; | |
| using System.Net; | |
| namespace HelloWorldLib | |
| { | |
| public class HelloWorld | |
| { | |
| private static Configuration _config; |
| <# | |
| .SYNOPSIS | |
| Extracts a specific file from nested CAB files within an MSU package. | |
| .DESCRIPTION | |
| Extracts MSU to get CAB files, then extracts a specific file by name, | |
| and performs additional expansion rounds if the file is itself a CAB. | |
| .PARAMETER MsuPath | |
| Path to the MSU file. |
| cl1p.net - The internet clipboard Login/Sign Up cl1p.net/cves | |
| Here is your stuff. Thanks for using cl1p. Tell your friends! Copy | |
| Upgrade to PRO | |
| {'file': 'kerberos.dll', 'patch_store_uid': 'c7eae9d4-8362-478d-b184-e4abea470c2b', 'kb': 'KB5068861', 'confidence': 0.15, 'date': 1763412539.2780097, 'cve': 'CVE-2025-60704', 'change_count': 22} | |
| -------------------------------------------------------------------- | |
| CVE-2025-60704 Report | |
| -------------------------------------------------------------------- | |
| Component | |
| -------------------------------------------------------------------- |
Building a Serverless Reverse TLS PRoxy Experiment.
curl "https://www.tlsdebug.com/debug?site=example.com"
{
"request": {
"method": "GET",
"url": "https://example.com/",
| # HelloOData.ps1 - Minimal OData Service | |
| $url = "http://localhost:8080/" | |
| $listener = New-Object System.Net.HttpListener | |
| $listener.Prefixes.Add($url) | |
| $listener.Start() | |
| Write-Host "OData service running at $url" | |
| Write-Host "Try: ${url}odata/`$metadata" | |
| Write-Host "Try: ${url}odata/Messages" |
| # PowerShell Web Command Executor | |
| # WARNING: This script allows remote command execution and poses significant security risks | |
| # Use only in isolated/trusted environments with proper security measures | |
| # Configuration | |
| $port = 8080 | |
| $prefix = "http://" + $port + "/" | |
| # Create HTTP listener | |
| $listener = New-Object System.Net.HttpListener |