Skip to content

Instantly share code, notes, and snippets.

View captainbarber99's full-sized avatar

Alexander captainbarber99

View GitHub Profile
import json
import sys
from java.io import PrintWriter
from burp import IBurpExtender
from burp import ISessionHandlingAction
class BurpExtender(IBurpExtender, ISessionHandlingAction):
def getActionName(self):
import json
import sys
from java.io import PrintWriter
from burp import IBurpExtender
from burp import IHttpRequestResponse
from burp import IHttpService
from burp import ISessionHandlingAction
import re
#Regex for extracting value of the token from the HTML Body
@captainbarber99
captainbarber99 / resources.md
Created August 11, 2020 15:33 — forked from muff-in/resources.md
A curated list of Assembly Language / Reversing / Malware Analysis -resources

Assembly Language / Reversing / Malware Analysis -resources

Twitter: Muffin

⭐Assembly Language

@captainbarber99
captainbarber99 / cve-2018-10993.py
Created July 30, 2019 13:45 — forked from mgeeky/cve-2018-10993.py
CVE-2018-10993 libSSH authentication bypass exploit
#!/usr/bin/python3
#
# CVE-2018-10993 libSSH authentication bypass exploit
#
# The libSSH library has flawed authentication/connection state-machine.
# Upon receiving from connecting client the MSG_USERAUTH_SUCCESS Message
# (as described in RFC4252, sec. 5.1.) which is an authentication response message
# that should be returned by the server itself (not accepted from client)
# the libSSH switches to successful post-authentication state. In such state,