This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
## | |
# This module requires Metasploit: http//metasploit.com/download | |
# Current source: https://github.com/rapid7/metasploit-framework | |
## | |
require 'msf/core' | |
class Metasploit3 < Msf::Auxiliary | |
include Msf::Auxiliary::Scanner |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
## | |
# This module requires Metasploit: http//metasploit.com/download | |
# Current source: https://github.com/rapid7/metasploit-framework | |
## | |
require 'msf/core' | |
class Metasploit3 < Msf::Exploit::Remote | |
Rank = AverageRanking |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env ruby | |
# Throttled single-threaded remote dictionary attack tool | |
# for Doom multiplayer server connection password. | |
# Tested on Zandronum 1.2.42016.1 | |
# 2014-12-20 | |
## | |
require 'socket' | |
$debug = false |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
## | |
# This module requires Metasploit: http://metasploit.com/download | |
# Current source: https://github.com/rapid7/metasploit-framework | |
## | |
require 'msf/core' | |
class Metasploit3 < Msf::Exploit::Remote | |
Rank = ManualRanking |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<html><head><script type="text/javascript"> | |
/* This script is a Proof of Concept for a timing-attack variation of UI | |
Redressing / click-jacking. It is designed to entice the user into clicking | |
rapidly in a certain location. */ | |
function fast_clicks() { | |
var tStart; | |
var tDate; | |
var tDiff; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<script type="text/javascript"> | |
// Windows Mail client DoS from browser PoC (with nntp/snews/news url handlers) | |
// 2011-09-16 // Brendan Coles <bcoles@gmail.com> | |
// Should work with Safari/Firefox on Windows Vista | |
// Some newsgroups are added. You can delete newsgroups here: | |
// C:\Users\username\AppData\Local\Microsoft\Windows Mail | |
function doit() { | |
//window_spam(); |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env ruby | |
# Alexa Rank | |
# Retrieves the Alexa rank for domain(s) | |
# 2011-09-19 # bcoles@gmail.com | |
## | |
verbose = true | |
version = "0.1" | |
# Usage |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
description = [[ | |
Attempts to retrieve device information from a 3COM NBX phone system using the | |
web interface. The web interface (NBX NetSet utility) runs on port 80 by | |
default. | |
]] | |
--- | |
-- @usage | |
-- nmap --script http-3com-nbx-info -p <port> <host> | |
-- |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
## | |
# This file is part of the Metasploit Framework and may be subject to | |
# redistribution and commercial restrictions. Please see the Metasploit | |
# Framework web site for more information on licensing and terms of use. | |
# http://metasploit.com/framework/ | |
## | |
require 'msf/core' | |
class Metasploit3 < Msf::Exploit::Remote |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
# decaptcha.sh - Cracks rudimentary CAPTCHA. Requires tesseract. | |
# --- | |
image="$1" | |
output=`mktemp` | |
charset="ABCDEFGHIJKLMNOPQRSTUVWXYZ" | |
command -v tesseract >/dev/null 2>&1 || { echo "Tesseract is not installed - (apt-get install tesseract-ocr) - Aborting." >&2; exit 1; } |
OlderNewer