This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3.3 | |
# -*- coding: utf8 -*- | |
# | |
# Read input from NMap and use the information from cve-search and | |
# Toolswatch DPE (Default Password Enumeration) list to provide a list of | |
# possible ways a system might be misconfigured or vulnerable. | |
# Imports | |
import os | |
import sys |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Exploit Title : Wordpress 5.3 - User Disclosure | |
# Author: Pwn0sec | |
# Date: 2020-08-12 | |
# Software Link: https://wordpress.org/download/ | |
# version : wp < 5.3 | |
# tested on : Ubunutu 18.04 / python 2.7 | |
# CVE: N/A | |
#!/usr/bin/python |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
# | |
# CVEs: CVE-2016-6210 (Credits for this go to Andri Wahyudi) | |
# | |
# Author: 0_o -- null_null | |
# server.0day [at] gmail.com | |
# Oh, and it is n-u-one-one.n-u-one-one, no l's... | |
# Wonder how the guys at packet storm could get this wrong :( | |
# | |
# Date: 2020-08-01 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3.3 | |
# -*- coding: utf8 -*- | |
# Imports | |
import argparse | |
import json | |
import os | |
import sys | |
runpath=os.path.dirname(os.path.realpath(__file__)) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env php | |
<?php | |
/** | |
* Coded by Duck Research | |
* 27 July 2020 | |
* | |
* Check phone number telco using HLRLookup. | |
* API Documentation: https://www.hlr-lookups.com/en/api-docs | |
*/ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
/** | |
* Website: http://sourceforge.net/projects/simplehtmldom/ | |
* Additional projects that may be used: http://sourceforge.net/projects/debugobject/ | |
* Acknowledge: Jose Solorzano (https://sourceforge.net/projects/php-html/) | |
* Contributions by: | |
* Duck Research (Attribute filters) | |
* Chickflow (Negative indexes supports of "find" method) | |
* 0x1_aulia (Constructor with automatically load contents either text or file/url) | |
* |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import requests | |
import threading | |
import random | |
ban = """ | |
01000011 01010110 01000101 00101101 00110010 | |
00110000 00110001 00111000 00101101 00110110 | |
00110011 00111000 00111001 01000101 01111000 | |
01110000 01101100 01101111 01101001 01110100 | |
""" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
#https://github.com/gh0x0st | |
#[email protected] | |
import sys,socket | |
address = '46.31.116.71' | |
port = 3389 | |
buffer = ['\x41'] | |
counter = 100 | |
while len(buffer)<= 10: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
#https://github.com/gh0x0st | |
#[email protected] | |
import sys,socket | |
address = '107.22.193.119' | |
port = 9999 | |
buffer = ['\x41'] | |
counter = 1000 | |
while len(buffer)<= 100: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
error_reporting(E_ALL); | |
$norm_delay = 0; | |
/////////////////////////////////////////////////////////////////////// | |
/////////////////////////////////////////////////////////////////////// | |
// WordPress 2.1.3 "admin-ajax.php" sql injection blind fishing exploit | |
// written by Andri Wahyudi "Pwn0sec" | |
// http://www.pwn0day.com/ | |
// 27. June 2020 | |
/////////////////////////////////////////////////////////////////////// |
NewerOlder