Skip to content

Instantly share code, notes, and snippets.

View darrenmartyn's full-sized avatar
💭
hacking

darrenmartyn

💭
hacking
View GitHub Profile
/*
* For original see haxx.in/files/blasty-vs-pkexec.c
*
* this version is just using some awful hack to
* avoid having to call gcc on the target box.
* this versions fragile - must be named payload.so
* might add better detection later, whatever.
* all credit to bl4sty for the actual exploit,
* I just made some changes for my usecase.
* you will have to change the interp for diff
#!/usr/bin/env python3
# coding: utf-8
import argparse
from Cryptodome.Cipher import DES
import random
import re
import requests
from urllib.parse import urljoin
from urllib3.exceptions import InsecureRequestWarning
#!/usr/bin/env python3
# quick bodge based on: https://rushter.com/blog/public-ssh-keys/
import socket
import sys
import paramiko.auth_handler
import argparse
def valid(self, msg):

Keybase proof

I hereby claim:

  • I am darrenmartyn on github.
  • I am darrenmartyn (https://keybase.io/darrenmartyn) on keybase.
  • I have a public key whose fingerprint is 0AE0 9E71 DA29 2CBF 9312 087F C2B8 64B1 25F3 A517

To claim this, I am signing this object: