Skip to content

Instantly share code, notes, and snippets.

View hutgrabber's full-sized avatar
Coffee? Coffee.

Sparsh hutgrabber

Coffee? Coffee.
View GitHub Profile
@hutgrabber
hutgrabber / cowroot.c
Last active November 10, 2024 22:18 — forked from rverton/cowroot.c
CVE-2016-5195 (DirtyCow) Local Root PoC
/*
* (un)comment correct payload first (x86 or x64)!
*
* $ gcc cowroot.c -o cowroot -pthread
* $ ./cowroot
* DirtyCow root privilege escalation
* Backing up /usr/bin/passwd.. to /tmp/bak
* Size of binary: 57048
* Racing, this may take a while..
* /usr/bin/passwd overwritten
@hutgrabber
hutgrabber / ROHIT.md
Created March 9, 2024 16:33
File will be updated as we go.

Material For Given Topics:

  1. Cyber Threats:

Context - For professionals working in the GST Department.

  • Phishing via Emails
  • Malicious Macros (word and excel)
  • Client Site Request Forgery / Server Side Request Forgery
  • Remote Code Execution
  • Local File Inclusion / Remote File Inclusion
  • Unauthorized Physical Access of the Machine
Host IP
192.168.100.1

Launch msfconsole

service postgresql start
sudo msfdb start
msfconsole -qr /home/siddicky/tools/multi-handler.rc
@hutgrabber
hutgrabber / LinuxCommands.md
Created March 6, 2024 12:17
Linux Commands - Nibber

Linux Commands


Miscellaneous → quality of life improvements for CLI.

#chmod---------------------
chmod [r, u, g] [file] #basic syntax
chmod 444 file_name.type #example
@hutgrabber
hutgrabber / POC-Shrey.py
Last active January 20, 2024 17:53
CVE-2020-25213-RCE-WordPress-Shrey.py
#!/usr/bin/env
# Exploit Title: WP-file-manager v6.9 - Unauthenticated Arbitrary File Upload leading to RCE
# Date: [ 22-01-2023 ]
# Exploit Author: [BLY]
# Vendor Homepage: [https://wpscan.com/vulnerability/10389]
# Version: [ File Manager plugin 6.0-6.9]
# Tested on: [ Debian ]
# CVE : [ CVE-2020-25213 ]
Host IP
192.168.100.1

Launch msfconsole

service postgresql start
sudo msfdb start
msfconsole -qr /home/siddicky/tools/multi-handler.rc