Skip to content

Instantly share code, notes, and snippets.

View GreatUncleBulgaria's full-sized avatar
💭
wombling around ...

Great Uncle Bulgaria GreatUncleBulgaria

💭
wombling around ...
  • Wimbledon Common
View GitHub Profile
@GreatUncleBulgaria
GreatUncleBulgaria / metasploit_exploits_by_rport.txt
Created September 29, 2017 09:16
Find metasploit exploits by their default RPORT port
exploit/osx/mdns/upnp_location: RPORT 0
exploit/windows/dcerpc/ms07_029_msdns_zonename: RPORT 0
exploit/windows/scada/igss9_misc: RPORT 0
exploit/windows/firewall/blackice_pam_icq: RPORT 1
exploit/windows/http/altn_webadmin: RPORT 1000
exploit/unix/webapp/webmin_show_cgi_exec: RPORT 10000
exploit/windows/backupexec/remote_agent: RPORT 10000
exploit/windows/oracle/osb_ndmp_auth: RPORT 10000
exploit/multi/misc/zend_java_bridge: RPORT 10001
exploit/windows/misc/gimp_script_fu: RPORT 10008
@GreatUncleBulgaria
GreatUncleBulgaria / web-servers.md
Created August 6, 2017 10:04 — forked from willurd/web-servers.md
Big list of http static server one-liners

Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.

Discussion on reddit.

Python 2.x

$ python -m SimpleHTTPServer 8000