Skip to content

Instantly share code, notes, and snippets.

@doorbash
doorbash / MisfortuneCookieExploit.py
Last active March 18, 2024 16:46
Multiple Vendors (RomPager <= 4.34) - Misfortune Cookie Router Authentication Bypass
# Title: Misfortune Cookie Exploit (RomPager <= 4.34) router authentication bypass exploit
# Date: 17/4/2016
# CVE: CVE-2015-9222 (http://mis.fortunecook.ie)
# Vendors: ZyXEL,TP-Link,D-Link,Nilox,Billion,ZTE,AirLive,...
# Vulnerable models: http://mis.fortunecook.ie/misfortune-cookie-suspected-vulnerable.pdf
# Versions affected: RomPager <= 4.34 (specially 4.07)
# Link: https://gist.github.com/doorbash/f454c698f192a0e5d1bf4da9c6869b67
# Exploit Database link: https://www.exploit-db.com/exploits/39739/
# 0day.today link: http://0day.today/exploit/25259
# Routersploit module : https://github.com/reverse-shell/routersploit/blob/master/routersploit/modules/exploits/multi/misfortune_cookie.py
/*
tone() Melody Player With Melodies Converted From GreenHillZone.mid
------------------------------------------------------------------------------
1. Save or copy-and-paste this file into the Arduino IDE
2. Configure the tonePin variable
3. Edit the melodyToPlay and tempoToPlay in the loop
Wiring: Attach a typical piezo element between the tonePin defined below
and ground. Maybe put a resistor in series too if you are feeling cautious.
void song(int buzzerPin){
tone(buzzerPin, 587);
delay(163);
noTone(buzzerPin);
tone(buzzerPin, 440);
delay(163);
noTone(buzzerPin);
# 1. pip3 install telethon
# 2. Go to https://my.telegram.org/ and get api_id, api_hash
from telethon import TelegramClient, events, sync
import logging
logging.basicConfig(format='[%(levelname) 5s/%(asctime)s] %(name)s: %(message)s',level=logging.WARNING)
api_id = 12345
api_hash = 'PUT-YOUR-API-HASH-HERE'
@doorbash
doorbash / script.sh
Created December 18, 2022 09:50
Set maximum upload/download speed limit to your linux server/pc's selected network interface.
#!/bin/bash
#usage: sudo IF=eth0 UPLOAD_SPEED_LIMIT=300kbps DOWNLOAD_SPEED_LIMIT=300kbps ./script.sh
modprobe ifb numifbs=1
ip link set dev ifb0 up
tc qdisc delete dev $IF handle ffff: ingress
tc qdisc add dev $IF handle ffff: ingress
tc filter add dev $IF parent ffff: protocol ip u32 match u32 0 0 action mirred egress redirect dev ifb0

http:

glider -verbose -listen :1080 -forward "http://127.0.0.1:10809"

socks5:

glider -verbose -listen :1080 -forward "socks5://127.0.0.1:10808"
@doorbash
doorbash / README.md
Last active October 23, 2022 00:31
openwrt fake connectivity check server for android/ios

add this line to ~/.profile :

    export HOST_IP=$(ipconfig.exe | grep 'vEthernet (WSL)' -A4 | cut -d":" -f 2 | tail -n1 | sed -e 's/\s*//g')
package main
import (
"log"
"reflect"
)
type Room struct {
name string
roomId int
package main
import (
"log"
"time"
)
func main() {
ch := make(chan string, 10)
done := make(chan struct{})