Skip to content

Instantly share code, notes, and snippets.

View 01x01's full-sized avatar
⛏️
Out sick

01x01

⛏️
Out sick
View GitHub Profile
from colorama import init
from colorama import Fore, Back, Style
init()
def sprint(msg):
print(Fore.GREEN + msg + Style.RESET_ALL)
Style.RESET_ALL
def fprint(msg):
print(Fore.RED + msg + Style.RESET_ALL)
@01x01
01x01 / main.go
Last active February 1, 2019 14:58
package main
import (
"flag"
"fmt"
"log"
"os"
"strings"
)
@01x01
01x01 / main.go
Last active February 1, 2019 13:49
package main
import (
"fmt"
"os"
)
func main(){
args := os.Args
fmt.Printf("args:%s\n",args)
@01x01
01x01 / main.go
Last active February 1, 2019 13:48
package main
import (
"fmt"
"log"
"runtime"
)
const info = `
Application %s starting.

vim ~/.zshrc

go

export GOPATH="/Users/xxxx/code/golang"
export GOBIN="$GOPATH/bin"
export PATH="$PATH:$GOBIN"
export ALL_PROXY=socks5://127.0.0.1:1080
unset ALL_PROXY
curl -i https://ip.cn

Today I will exploit the vulnerable image which called "FourAndSix2". Here is the url to download this image: https://www.vulnhub.com/entry/fourandsix-201,266/. we need to import the image to vmware once we downloaded it. now here we go.

step1 start the Metasploit

>> msfconsole

step2 scan ports

msf>> db_nmap 192.168.30.1/24

安装源

  1. github 中 已有的模块
https://github.com/rapid7/metasploit-framework/tree/master/modules
  1. exploit-db 中已有的模块

安装方法

msfconsole
msfupdate

启动 数据库

service postgresql start

启动Metasploit

msfconsole

初始化 db

# app 的使用
from utils.customlog import CustomLog
logger = CustomLog(__name__).getLogger()