Skip to content

Instantly share code, notes, and snippets.

View andripwn's full-sized avatar
☺️
Taking it easy

mickeybrew andripwn

☺️
Taking it easy
View GitHub Profile
#!/usr/bin/env python3.3
# -*- coding: utf8 -*-
# Imports
import argparse
import json
import os
import sys
runpath=os.path.dirname(os.path.realpath(__file__))
@andripwn
andripwn / CVE-2016-6210.py
Created August 1, 2020 06:02
OpenSSH 7.2p2 - Username Enumeration
#!/usr/bin/python
#
# CVEs: CVE-2016-6210 (Credits for this go to Andri Wahyudi)
#
# Author: 0_o -- null_null
# server.0day [at] gmail.com
# Oh, and it is n-u-one-one.n-u-one-one, no l's...
# Wonder how the guys at packet storm could get this wrong :(
#
# Date: 2020-08-01
# Exploit Title : Wordpress 5.3 - User Disclosure
# Author: Pwn0sec
# Date: 2020-08-12
# Software Link: https://wordpress.org/download/
# version : wp < 5.3
# tested on : Ubunutu 18.04 / python 2.7
# CVE: N/A
#!/usr/bin/python
#!/usr/bin/env python3.3
# -*- coding: utf8 -*-
#
# Read input from NMap and use the information from cve-search and
# Toolswatch DPE (Default Password Enumeration) list to provide a list of
# possible ways a system might be misconfigured or vulnerable.
# Imports
import os
import sys