scusi / dns_xor.go
0 beğeniler
0 çatallar
1 dosyalar
Son aktivite 6 months ago
| 1 | // domain data encoding/decoding algo for FrameworkPOS Malware DNS-Tunneling Variant, |
| 2 | // as described on: |
| 3 | // https://blog.gdata.de/artikel/neue-variante-von-frameworkpos-schoepft-daten-ueber-dns-anfragen-ab/ |
| 4 | // |
| 5 | |
| 6 | package main |
| 7 | |
| 8 | import( |
| 9 | "fmt" |
| 10 | "os" |
scusi / parseFritzBpjmFile.go
0 beğeniler
0 çatallar
1 dosyalar
Son aktivite 6 months ago
| 1 | // parse a FritzBox Bpjm File |
| 2 | |
| 3 | package main |
| 4 | |
| 5 | import ( |
| 6 | "os" |
| 7 | "fmt" |
| 8 | "bytes" |
| 9 | "io" |
| 10 | "io/ioutil" |
scusi / gifExeExtract.go
0 beğeniler
0 çatallar
1 dosyalar
Son aktivite 6 months ago
| 1 | ## see also https://0x41414141.de/blog/2017-03-30-trojan-ransom.win32.foreign-hides-payload-exe-in-gif-file/ |
| 2 | # |
| 3 | package main |
| 4 | |
| 5 | import ( |
| 6 | "bufio" |
| 7 | "bytes" |
| 8 | "container/ring" |
| 9 | "encoding/hex" |
| 10 | "flag" |
scusi / rolling xor in go
0 beğeniler
0 çatallar
1 dosyalar
Son aktivite 6 months ago
| 1 | package main |
| 2 | |
| 3 | import ( |
| 4 | "container/ring" |
| 5 | "flag" |
| 6 | "io/ioutil" |
| 7 | "log" |
| 8 | ) |
| 9 | |
| 10 | var keyFile string |
scusi / disableTelemetry.ps1
0 beğeniler
0 çatallar
1 dosyalar
Son aktivite 6 months ago
powershell script to disable telemetry in win10
| 1 | # powershell script to disable telemetry in win10 |
| 2 | # |
| 3 | # Source: |
| 4 | # https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Cyber-Sicherheit/SiSyPHus/Analyse_Telemetriekomponente.pdf?__blob=publicationFile&v=3 |
| 5 | |
| 6 | # run as admin |
| 7 | if (!([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) { Start-Process powershell.exe "-NoProfile -ExecutionPolicy Bypass -File `"$PSCommandPath`"" -Verb RunAs; exit } |
| 8 | |
| 9 | # Step 1: deactivate DiagTrack service |
| 10 | Set-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Services\DiagTrack\ -name Start -Value 4 |
scusi / enableTelemetry.ps1
0 beğeniler
0 çatallar
1 dosyalar
Son aktivite 6 months ago
powershell script to (re-)enable telemetry in win10
| 1 | # powershell script to (re-)enable telemetry in win10 |
| 2 | # |
| 3 | # flw@posteo.de |
| 4 | # |
| 5 | |
| 6 | # run as admin |
| 7 | if (!([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) { Start-Process powershell.exe "-NoProfile -ExecutionPolicy Bypass -File `"$PSCommandPath`"" -Verb RunAs; exit } |
| 8 | |
| 9 | # Step 1: deactivate DiagTrack service |
| 10 | Set-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Services\DiagTrack\ -name Start -Value 2 |
Daha yeni
Daha eski