This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#coding: utf-8 | |
''' | |
-------------------------------------------------------------------------------------- | |
# [+] JexBoss v1.0. @autor: João Filho Matos Figueiredo ([email protected]) | |
# [+] Updates: https://github.com/joaomatosf/jexboss | |
# [+] SCRIPT original: http://1337day.com/exploit/23507 | |
# [+] Free for distribution and modification, but the authorship should be preserved. | |
-------------------------------------------------------------------------------------- | |
[+] SCRIPT Edited by: [ I N U R L - B R A S I L ] - [ By GoogleINURL ] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
/* | |
# AUTOR DISCOVERY: Back-DOOR - https://fb.com/Backdoor.ma | |
# REF: https://ghostbin.com/paste/metta , https://www.youtube.com/watch?v=4PqqBhD6ov4 | |
# Exploit Title: Joomla ADSmanager Exploit Arbitrary File Upload Vulnerability | |
# TIPE: Arbitrary File Upload | |
# Google DORK: inurl:/index.php?option=com_adsmanager" | |
# EXPLOIT: /index.php?option=com_adsmanager&task=upload&tmpl=component | |
# Tested on: Linux |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
: ' | |
MINI-EXPLOIT // Metasploit->Drupal HTTP Parameter Key/Value SQL Injection | |
This module exploits the Drupal HTTP Parameter Key/Value SQL Injection | |
(aka Drupageddon) in order to achieve a remote shell on the vulnerable instance. | |
This module was tested against Drupal 7.0 and 7.31 (was fixed in 7.32). | |
Exploração: Drupal 7.0 - 7.31 | |
----------------------------------------------------------------------- | |
AUTOR-SCRIPT-OTIMIZADOR: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
/* | |
E d i ç ã o - 2.0 / 29-09-2015 | |
-------------------------------------------------------------------------------- | |
[+] AUTOR: Cleiton Pinheiro / Nick: googleINURL | |
[+] Blog: http://blog.inurl.com.br | |
-------------------------------------------------------------------------------- | |
*/ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
: ' | |
MINI-EXPLOIT // SQLMAP ~ | |
------------------------------------------------------ | |
[+] AUTOR: Cleiton Pinheiro / Nick: googleINURL | |
[+] EMAIL: [email protected] | |
[+] Blog: http://blog.inurl.com.br | |
[+] Twitter: https://twitter.com/googleinurl |