This gist was built by the community of the researchers and was scribed by Kir and Igor from the QIWI/Vulners. We are grateful for the help of all those who sent us the data, links and information. Together we can make this world a better place!
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Your website unpatched vulnerabilities at the Openbugbounty: | |
[type:openbugbounty AND title:"your-domain-here.com" AND openbugbounty.patchStatus:unpatched](http://bit.ly/2d12FF9) | |
Software vulnerabilities, Firefox as example: | |
[affectedSoftware.name:"firefox" OR affectedPackage.packageName:"firefox" OR cpe:*firefox* order:published](http://bit.ly/2cQvJ4e) | |
Software vulnerabilities, for exact version. Nginx 1.11.0 vulnerabilities: | |
[affectedSoftware.name:nginx AND affectedSoftware.version:"1.11.0"](http://bit.ly/2dEX8oz) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
""" | |
vulners_scanner.py | |
Copyright 2018 Kir Ermakov ([email protected]), Ilya Govorkov ([email protected]) | |
This file is part of w3af, http://w3af.org/ . | |
w3af is free software; you can redistribute it and/or modify | |
it under the terms of the GNU General Public License as published by | |
the Free Software Foundation version 2 of the License. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#! /usr/bin/env python3.6 | |
# -*- coding: utf-8 -*- | |
# | |
# VULNERS OPENSOURCE | |
# __________________ | |
# | |
# Vulners Project [https://vulners.com] | |
# All Rights Reserved. | |
# | |
# Author: Kir [[email protected]] |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
# -*- coding: utf-8 -*- | |
# | |
# VULNERS OPENSOURCE | |
# __________________ | |
# | |
# Vulners Project [https://vulners.com] | |
# All Rights Reserved. | |
# | |
# Exploit Title: Mikrotik exploit from Vault 7 CIA Leaks automation tool. Takeovers up to RouterOS 6.38.4. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import os, psutil | |
import random | |
import string | |
large_string = "".join([random.choice(string.ascii_letters + string.punctuation) for _ in range(0, 500000)]) | |
process = psutil.Process(os.getpid()) | |
def is_palindrome(str_array): | |
str_array = str_array.lower() |
VULNERS OPENSOURCE, Vulners Project [https://vulners.com]
esxcli storage filesystem list