I hereby claim:
- I am evilcry on github.
- I am evilcry (https://keybase.io/evilcry) on keybase.
- I have a public key whose fingerprint is AFDF D6C3 500E BB73 4035 F0AF 1732 42AE 255D E336
To claim this, I am signing this object:
cve-2019-8449 | |
The /rest/api/latest/groupuserpicker resource in Jira before version 8.4.0 allows remote attackers to enumerate usernames via an information disclosure vulnerability. | |
https://jira.atlassian.com/browse/JRASERVER-69796 | |
https://victomhost/rest/api/latest/groupuserpicker?query=1&maxResults=50000&showAvatar=true | |
===================================================================================================================================== |
" _ _ " | |
" _ /|| . . ||\ _ " | |
" ( } \||D ' ' ' C||/ { % " | |
" | /\__,=_[_] ' . . ' [_]_=,__/\ |" | |
" |_\_ |----| |----| _/_|" | |
" | |/ | | | | \| |" | |
" | /_ | | | | _\ |" | |
It is all fun and games until someone gets hacked! |
import requests | |
from bs4 import BeautifulSoup | |
headers = {"User-Agent":"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.111 Safari/537.36"} | |
r = requests.get("https://lite.ip2location.com/...your-country...-ip-address-ranges", headers = headers) | |
txt = r.text |
#Requires -RunAsAdministrator | |
$services = Get-WmiObject win32_service | select Name, PathName | |
Foreach ( $entry in $services ) { | |
if ( $entry.PathName -match "Program" ) { | |
if ( $entry.PathName -notmatch "\`"*\`"" -and $entry.PathName -match " ") { | |
Write-Host "Potentially Vulnerable Service: $($entry.Name) with Path: $($entry.PathName)" -BackgroundColor DarkGreen | |
} | |
} |
# Find Autoelevate executables | |
Write-Host "System32 Autoelevate Executables" -ForegroundColor Green -BackgroundColor Black | |
Select-String -Path C:\Windows\System32\*.exe -pattern "<AutoElevate>true" | |
Write-Host "`nSysWOW64 Autoelevate Executables" -ForegroundColor Green -BackgroundColor Black | |
Select-String -Path C:\Windows\SysWOW64\*.exe -pattern "<AutoElevate>true" |
// Ref. https://gist.github.com/mmcloughlin/17e3ca302785f0e525655191d3f9211d | |
package main | |
import ( | |
"fmt" | |
"io/ioutil" | |
"log" | |
"net/http" | |
"golang.org/x/net/proxy" |
I hereby claim:
To claim this, I am signing this object:
000000 Officially Xerox | |
000001 SuperLAN-2U | |
000002 BBN (was internal usage only, no longer used) | |
000003 XEROX CORPORATION | |
000004 XEROX CORPORATION | |
000005 XEROX CORPORATION | |
000006 XEROX CORPORATION | |
000007 XEROX CORPORATION | |
000008 XEROX CORPORATION | |
000009 powerpipes? |
Hash List
:~/collected$ sha256sum *
efa4fe06e4949c0f7aedea61a79da92e379ea66b169cd1d99c47b9e93e814093 arm
1ff787d52bc9ec27d75b1a427c3e5dd16d6d5f082a79227c14edf8e908ab2 arm7
bab7e9f42df88902acb00fbdf3b4b5d8ffec2a1a7ad32eb5f2fb1dbf38f3167d mips
a79964ce5cf4b92f996bbc24230e102b94ef05fb072c0afdeabc88d28695cace mipsel
Arch List
wmic /namespace:\\root\cimv2 PATH Win32_PerfFormattedData_Counters_ThermalZoneInformation get Temperature |