The goal was to bypass WAF protection to access local resources.
app.re_ip = re.compile('\A(\d+)\.(\d+)\.(\d+)\.(\d+)\Z')
def valid_ip(ip):
matches = app.re_ip.match(ip)
#!/usr/bin/python3 | |
from __future__ import division | |
from __future__ import print_function | |
import re | |
import codecs | |
import logging | |
import time | |
import argparse | |
import sys | |
from impacket import version |
# Simple script to check drivers in C:\windows\system32\drivers against the loldrivers list | |
# Author: Oddvar Moe - @oddvar.moe | |
$drivers = get-childitem -Path c:\windows\system32\drivers | |
$web_client = new-object system.net.webclient | |
$loldrivers = $web_client.DownloadString(" https://www.loldrivers.io/api/drivers.json") | ConvertFrom-Json | |
Write-output("Checking {0} drivers in C:\windows\system32\drivers against loldrivers.io json file" -f $drivers.Count) | |
foreach ($lol in $loldrivers.KnownVulnerableSamples) | |
{ |
PrinterLogic's Enterprise Print Management software allows IT professionals to simplify printer driver management and empower end users. -- https://www.printerlogic.com/
The following findings were identified by performing both dynamic testing of the PrinterLogic SaaS platform and code analysis of the source code contained in the virtual appliance available for download from the PrinterLogic website (Build 1.0.757: July 29th, 2022).
% Wra7h/FlavorTown | |
% MATLAB version: R2023a | |
% Tested on Win10 x64 | |
if not(libisloaded('kernel32')) | |
loadlibrary('kernel32.dll', @kernel32proto); | |
end | |
if not(libisloaded('msvcrt')) | |
loadlibrary('msvcrt.dll', @msvcrtproto); |
from datetime import datetime | |
import xml.etree.ElementTree as ET | |
from typing import List, Dict, Optional | |
import os | |
import re | |
from impacket.dcerpc.v5.dcom.wmi import WBEMSTATUS | |
from nxc.helpers.logger import highlight | |
class TaskVulnerability: | |
def __init__(self, name: str, path: str, command: str, author: str, |