Skip to content

Instantly share code, notes, and snippets.

View AzraelSec's full-sized avatar
🔥
Hacking the Planet

Federico AzraelSec

🔥
Hacking the Planet
View GitHub Profile
version: "3.9"
services:
rg-mysql:
image: "mysql:latest"
ports:
- "3306:3306"
environment:
MYSQL_ROOT_PASSWORD: "root"
rg-redis:
image: "redis:alpine"

Keybase proof

I hereby claim:

  • I am azraelsec on github.
  • I am azraelsec (https://keybase.io/azraelsec) on keybase.
  • I have a public key ASCjD4ofXhNUx-z7t0LtprcO8Ssh5esmkB7UJumEcaTPEQo

To claim this, I am signing this object:

### Keybase proof
I hereby claim:
* I am azraelsec on github.
* I am azraelsec (https://keybase.io/azraelsec) on keybase.
* I have a public key ASCjD4ofXhNUx-z7t0LtprcO8Ssh5esmkB7UJumEcaTPEQo
To claim this, I am signing this object:
### Keybase proof
I hereby claim:
* I am azraelsec on github.
* I am azraelsec (https://keybase.io/azraelsec) on keybase.
* I have a public key ASCjD4ofXhNUx-z7t0LtprcO8Ssh5esmkB7UJumEcaTPEQo
To claim this, I am signing this object:
### Keybase proof
I hereby claim:
* I am azraelsec on github.
* I am azraelsec (https://keybase.io/azraelsec) on keybase.
* I have a public key ASCjD4ofXhNUx-z7t0LtprcO8Ssh5esmkB7UJumEcaTPEQo
To claim this, I am signing this object:
@AzraelSec
AzraelSec / Webmin-1.910_exploit_RCE.py
Created March 14, 2020 20:02
This is a simple exploit for version 1.910 of Webmin service that leads to Remote Code Execution
#!/usr/bin/python
from requests import post
from urllib import quote
from base64 import b64encode
from requests.packages.urllib3 import disable_warnings
from urllib3.exceptions import InsecureRequestWarning
USER = 'USER'
PASS = 'PASSWORD'
@AzraelSec
AzraelSec / keybase.md
Last active September 11, 2019 14:31

Keybase proof

I hereby claim:

  • I am azraelsec on github.
  • I am btcfox (https://keybase.io/btcfox) on keybase.
  • I have a public key ASCpkz-ti27FyA0u7MS_d_GA3J23l1bPRhXr9SkVO8_DhQo

To claim this, I am signing this object: