This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
1. navigate to: https://x.com/settings/your_twitter_data/twitter_interests | |
2. run the following script in the browser console: | |
``` | |
javascript:(function clickCheckedItems(){let i=document.querySelectorAll("input[type='checkbox']:checked");if(i.length>0){i.forEach((w,n)=>{if(n<15){setTimeout(()=> w.click(),Math.random()*6000+1000);}});setTimeout(clickCheckedItems,15000);}})(); | |
``` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# http://docs.python-requests.org/en/master/api/ | |
import requests | |
class RequestsApi: | |
def __init__(self, base_url, **kwargs): | |
self.base_url = base_url | |
self.session = requests.Session() | |
for arg in kwargs: | |
if isinstance(kwargs[arg], dict): | |
kwargs[arg] = self.__deep_merge(getattr(self.session, arg), kwargs[arg]) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Updated on 29/01/2021 | |
# IOCs from Google TAG https://blog.google/threat-analysis-group/new-campaign-targeting-security-researchers/ | |
# IOCs from Microsoft MSTIC https://www.microsoft.com/security/blog/2021/01/28/zinc-attacks-against-security-researchers/ | |
# Checks the registry, if not compromised each test will return "ERROR: The system was unable to find the specified registry key or value." | |
reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\KernelConfig" | |
reg query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\DriverConfig" | |
reg query "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SSL Update" | |
# Checks the following paths, if not compromised each test will return false |
I hereby claim:
- I am voidsec on github.
- I am voidsec (https://keybase.io/voidsec) on keybase.
- I have a public key ASAAkzkIA7goEHg_eaBkkY7Su27pQuYRf-NtZkQbBID1uAo
To claim this, I am signing this object:
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* | |
Full title: VirIT Explorer Lite & Pro v.8.1.68 Local Privilege Escalation (System)/Arbitrary Code Execution | |
Exploit Author: Paolo Stagno - [email protected] | |
Vendor Homepage: http://www.tgsoft.it | |
Version: VirIT Explorer Lite & Pro v.8.1.68 | |
Tested on: Windows 7 | |
CVE: TBD | |
CVSS v2: 6.8 (AV:L/AC:L/Au:S/C:C/I:C/A:C/E:H/RL:U/RC:C) - https://nvd.nist.gov/cvss.cfm?calculator&version=2&vector=%28AV:L/AC:L/Au:S/C:C/I:C/A:C/E:H/RL:U/RC:C%29 | |
Category: local exploits | |
Platform: windows |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
### Keybase proof | |
I hereby claim: | |
* I am VoidSec on github. | |
* I am voidsec (https://keybase.io/voidsec) on keybase. | |
* I have a public key whose fingerprint is 4ACF D42C C873 B737 114B DB7A 9A3A DBB7 EB98 B63E | |
To claim this, I am signing this object: |