This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/perl | |
# | |
# Google Email miner | |
# SensePost Research 2003 | |
# roelof@sensepost.com | |
# | |
# Assumes the GoogleSearch.wsdl file is in same directory | |
# | |
$|=1; | |
use SOAP::Lite; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<%@ page contentType="text/html; charset=GBK" language="java" import="java.sql.*,java.io.File,java.io.*,java.nio.charset.Charset,java.io.IOException,java.util.*" errorPage="" %> | |
<% | |
/** | |
* <p>Title:JspWebshell </p> | |
* | |
* <p>Description: jsp网站管理</p> | |
* | |
* <p>Copyright:绝对零度[B.C.T] Copyright (c) 2006</p> | |
* | |
* <p>Company: zero.cnbct.org</p> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# CVE-2009-1151: phpMyAdmin '/scripts/setup.php' PHP Code Injection RCE PoC v0.11 | |
# by pagvac (gnucitizen.org), 4th June 2009. | |
# special thanks to Greg Ose (labs.neohapsis.com) for discovering such a cool vuln, | |
# and to str0ke (milw0rm.com) for testing this PoC script and providing feedback! | |
# PoC script successfully tested on the following targets: | |
# phpMyAdmin 2.11.4, 2.11.9.3, 2.11.9.4, 3.0.0 and 3.0.1.1 | |
# Linux 2.6.24-24-generic i686 GNU/Linux (Ubuntu 8.04.2) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
## | |
# $Id$ | |
## | |
## | |
# This file is part of the Metasploit Framework and may be subject to | |
# redistribution and commercial restrictions. Please see the Metasploit | |
# web site for more information on licensing and terms of use. | |
# http://metasploit.com/ | |
## |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
################################################################################ | |
######### MS11-080 - CVE-2011-2005 Afd.sys Privilege Escalation Exploit ######## | |
######### Author: ryujin@offsec.com - Matteo Memelli ######## | |
######### Spaghetti & Pwnsauce ######## | |
######### yuck! 0xbaadf00d Elwood@mac&cheese.com ######## | |
######### ######## | |
######### Thx to dookie(lifesaver)2000ca, dijital1 and ronin ######## | |
######### for helping out! ######## | |
######### ######## | |
######### To my Master Shifu muts: ######## |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from random import shuffle, randint | |
import re | |
from sets import Set | |
def f1(seq): # Raymond Hettinger | |
# not order preserving | |
set = {} | |
map(set.__setitem__, seq, []) | |
return set.keys() |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/perl | |
use IO::Socket; | |
# unbuffered output | |
$|=1; | |
# XSS-Proxy.pl | |
# | |
# Anton Rager - a_rager@yahoo.com |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// Exploit Title: PHP 5.4 (5.4.3) Code Execution 0day (Win32) | |
// Exploit author: 0in (Maksymilian Motyl) | |
// Email: 0in(dot)email(at)gmail.com | |
// * Bug with Variant type parsing originally discovered by Condis | |
// Tested on Windows XP SP3 fully patched (Polish) | |
=================== | |
offset-brute.html | |
=================== |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#/usr/bin/python | |
#coding: utf-8 | |
import socket | |
import time | |
import os | |
import sys | |
import struct | |
import threading | |
import Queue |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
#coding:utf-8 | |
import Image,ImageFont,ImageDraw,ImageFilter | |
import os,sys | |
from math import atan2,pi,sqrt | |
import cPickle as pickle | |
#import psyco | |
#psyco.full() |
NewerOlder