Skip to content

Instantly share code, notes, and snippets.

View Mah1ndra's full-sized avatar
🏡
Remote

Mahendra Thanniru Mah1ndra

🏡
Remote
View GitHub Profile
// Place your settings in this file to overwrite default and user settings.
{
"editor.wrappingColumn": 0,
"files.exclude": {
"**/node_modules": {},
"typings": {},
"**/*.map": {},
"**/*.js": {
"when": "$(basename).ts"
}
[
{
"name":"Barot Bellingham",
"shortname":"Barot_Bellingham",
"reknown":"Royal Academy of Painting and Sculpture",
"bio":"Barot has just finished his final year at The Royal Academy of Painting and Sculpture, where he excelled in glass etching paintings and portraiture. Hailed as one of the most diverse artists of his generation, Barot is equally as skilled with watercolors as he is with oils, and is just as well-balanced in different subject areas. Barot's collection entitled \"The Un-Collection\" will adorn the walls of Gilbert Hall, depicting his range of skills and sensibilities - all of them, uniquely Barot, yet undeniably different"
}, {
"name":"Jonathan G. Ferrar II",
"shortname":"Jonathan_Ferrar",
"reknown":"Artist to Watch in 2012",
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8" />
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<title>Page Title</title>
<meta name="viewport" content="width=device-width, initial-scale=1">
</head>
<body>
#!/usr/bin/env python3
"""
Code takes urls from cmd line.
ex: ./crawler.py https://packages.debian.org/jessie/armel/patch/download
The Crawler downalods all the debian patch files from the give link and stores in the specified outpath
References:
https://stackoverflow.com/questions/12996274/get-file-size-from-content-length-value-from-a-file-in-python-3-2
https://stackoverflow.com/questions/29827479/beautifulsoup-download-all-zip-files-from-google-patent-search
"""
from bs4 import BeautifulSoup
@Mah1ndra
Mah1ndra / nmap.sh
Last active February 8, 2020 17:55
#!/bin/bash
ip=$1;
echo "scaning: $ip";
ports=$(nmap -T4 --min-rate=1000 -p- $ip| grep ^[0-9]|cut -d '/' -f 1| tr '\n' ',' | sed s/,$//);
echo "open ports: $ports"
Serial Keys:
FU512-2DG1H-M85QZ-U7Z5T-PY8ZD
CU3MA-2LG1N-48EGQ-9GNGZ-QG0UD
GV7N2-DQZ00-4897Y-27ZNX-NV0TD
YZ718-4REEQ-08DHQ-JNYQC-ZQRD0
GZ3N0-6CX0L-H80UP-FPM59-NKAD4
YY31H-6EYEJ-480VZ-VXXZC-QF2E0
ZG51K-25FE1-H81ZP-95XGT-WV2C0
VG30H-2AX11-H88FQ-CQXGZ-M6AY4
@Mah1ndra
Mah1ndra / distccd_rce_CVE-2004-2687.py
Created July 6, 2020 16:27 — forked from DarkCoderSc/distccd_rce_CVE-2004-2687.py
(CVE-2004-2687) DistCC Daemon - Command Execution (Python)
#!/usr/bin/python
# -*- coding: utf-8 -*-
'''
distccd v1 RCE (CVE-2004-2687)
This exploit is ported from a public Metasploit exploit code :
https://www.exploit-db.com/exploits/9915
@Mah1ndra
Mah1ndra / Magento-shoplift-rce.py
Last active July 15, 2020 00:39
Magento eCommerce - Remote Code Execution : xml/webapps/37977.py
##################################################################################################
#Exploit Title : Magento Shoplift exploit (SUPEE-5344)
#Author : Manish Kishan Tanwar AKA error1046
#Date : 25/08/2015
#Love to : zero cool,Team indishell,Mannu,Viki,Hardeep Singh,Jagriti,Kishan Singh and ritu rathi
#Debugged At : Indishell Lab(originally developed by joren)
##################################################################################################
"""
////////////////////////
/// Overview:
@Mah1ndra
Mah1ndra / Magento-Auth-RCE.py
Created July 15, 2020 00:37
Magento CE < 1.9.0.1 - (Authenticated) Remote Code Execution : php/webapps/37811.py
#!/usr/bin/python
# Exploit Title: Magento CE < 1.9.0.1 Post Auth RCE
# Google Dork: "Powered by Magento"
# Date: 08/18/2015
# Exploit Author: @Ebrietas0 || http://ebrietas0.blogspot.com
# Vendor Homepage: http://magento.com/
# Software Link: https://www.magentocommerce.com/download
# Version: 1.9.0.1 and below
# Tested on: Ubuntu 15
# CVE : none
# Drupal 7.x Module Services - Remote Code Execution
# Exploit Title: Drupal 7.x Services Module Remote Code Execution
# Vendor Homepage: https://www.drupal.org/project/services
# Exploit Author: Charles FOL
# Contact: https://twitter.com/ambionics
# Website: https://www.ambionics.io/blog/drupal-services-module-rce
#!/usr/bin/php
<?php