Skip to content

Instantly share code, notes, and snippets.

View CCrashBandicot's full-sized avatar
🎯
Focusing

Amine Bendouil CCrashBandicot

🎯
Focusing
View GitHub Profile
# Exploit Title: Wordpress Plugin MailChimp Subscribe Forms - Remote Code Execution
# Date: 23-03-2016
# Exploit Author: CrashBandicot
# Google Dork : inurl:/wp-content/plugins/mailchimp-subscribe-sm/
# Vendor Homepage: https://fr.wordpress.org/plugins/mailchimp-subscribe-sm/
# Tested on: MSWin32
# Version: 1.1
# Vulnerability in GET
# Put your mail for subscribe and send but add in URL the Parameter sm_name with PHP Code
# Exploit Title: Wordpress Plugin Issuu Panel - RFI & LFI
# Exploit Author: CrashBandicot
# Date: 2016-03-23
# Google Dork : inurl:/wp-content/plugins/issuu-panel/
# Vendor Homepage: https://wordpress.org/plugins/issuu-panel/
# Tested on: MsWIn
# Version: 1.6
# Vulnerable File : menu/documento/requests/ajax-docs.php
# Exploit Title: Wordpress Plugin Abtest - Local File Inclusion
# Date: 2016-03-19
# Google Dork : inurl:/wp-content/plugins/abtest/
# Exploit Author: CrashBandicot
# Vendor Homepage: https://github.com/wp-plugins/abtest
# Tested on: Chrome
# Vulnerable File : abtest_admin.php
# Exploit Title: Wordpress Plugin HB Audio Gallery Lite - Arbitrary File Download
# Exploit Author: CrashBandicot
# Date: 2016-03-22
# Google Dork : inurl:/wp-content/plugins/hb-audio-gallery-lite
# Vendor Homepage: https://fr.wordpress.org/plugins/hb-audio-gallery-lite/
# Tested on: MSWin32
# Version: 1.0.0
# Vuln file : gallery/audio-download.php
# Exploit Title: Wordpress Plugin IMDb Profile Widget - Local File Inclusion
# Exploit Author: CrashBandicot @DosPerl
# Date: 2016-03-26
# Google Dork : inurl:/wp-content/plugins/imdb-widget
# Vendor Homepage: https://wordpress.org/plugins/imdb-widget/
# Tested on: MSWin32
# Version: 1.0.8
# Vuln file : pic.php
# Exploit Title: Wordpress Plugin Photocart Link - Local File Inclusion
# Exploit Author: CrashBandicot @DosPerl
# Date: 2016-03-27
# Google Dork : inurl:/wp-content/plugins/photocart-link/
# Vendor Homepage: https://fr.wordpress.org/plugins/photocart-link/
# Tested on: MSWin32
# Version: 1.6
# Vuln file : decode.php
#!/usr/bin/perl
use HTTP::Request;
use LWP::UserAgent;
if($^O =~ /Win/){
system("cls");
system("color a");
system("title Reverse D0main YougetSignal");