Skip to content

Instantly share code, notes, and snippets.

View mohemiv's full-sized avatar

Arseniy Sharoglazov mohemiv

  • My personal account
View GitHub Profile
#!/usr/bin/env node
/*
Accompanying code for the tweet in PT SWARM.
Tweet's text:
Simple way to bypass a WAF in Command Injections!
Also helps with length restrictions!
Tweet's link: https://twitter.com/ptswarm/status/1799069750863270364
@mohemiv
mohemiv / rpcrelayclientserver.patch
Created September 9, 2020 20:06 — forked from sploutchy/rpcrelayclientserver.patch
RPC Relay Client and Server Patch
From 53256e4b29331df20a5977b54c1741b2adc30394 Mon Sep 17 00:00:00 2001
From: root <root@localhost.localdomain>
Date: Wed, 9 Sep 2020 11:54:00 +0200
Subject: [PATCH] RPC Relay client and server
---
examples/ntlmrelayx.py | 12 +-
impacket/dcerpc/v5/dcomrt.py | 30 +-
impacket/dcerpc/v5/rpcrt.py | 624 ++++++++++++++++--
.../examples/ntlmrelayx/attacks/rpcattack.py | 95 +++
@mohemiv
mohemiv / impacket-rpc-relay.patch
Last active May 15, 2020 02:03
Impacket Reaying to RPC attack Original
diff --git a/examples/ntlmrelayx.py b/examples/ntlmrelayx.py
index c53da8fa..3eb6bb33 100755
--- a/examples/ntlmrelayx.py
+++ b/examples/ntlmrelayx.py
@@ -145,12 +145,14 @@ def start_servers(options, threads):
c.setExeFile(options.e)
c.setCommand(options.c)
c.setEnumLocalAdmins(options.enum_local_admins)
+ c.setDisableMulti(options.disable_multi)
c.setEncoding(codec)