Skip to content

Instantly share code, notes, and snippets.

import dns.resolver
import sys
list_of_dcs = []
new_dict = {}
GREEN = '\033[0;32m'
def print_colored(message, color_code):
RESET_COLOR = "\033[0m"
print(f"{color_code}{message}{RESET_COLOR}")
@RalphDesmangles
RalphDesmangles / customqueries.json
Created March 24, 2024 06:34
custom bloodhound queries
{
"queries": [
{
"name": "Find all Certificate Templates",
"category": "Certificates",
"queryList": [
{
"final": true,
"query": "MATCH (n:GPO) WHERE n.type = 'Certificate Template' RETURN n"
}
@mbb5546
mbb5546 / columbiasoft-improper-auth.yaml
Last active March 19, 2024 16:58
This repository contains a Nuclei template that can be used to identify instances of ColumbiaSoft's Document Locator that are vulnerable to CVE-2023-5830
id: CVE-2023-5830
info:
name: ColumbiaSoft DocumentLocator - Improper Authentication
author: Gonski
severity: critical
description: |
Instances of ColumbiaSoft's Document Locator prior to version 7.2 SP4 and 2021.1 are vulnerable to an Improper Authentication/SSRF vulnerability. This template identifies vulnerable instances of the ColumbiaSoft Document Locater application by confirming external DNS interaction/lookups by modifying the value of the client-side SERVER parameter at /api/authentication/login.
impact: |
An attacker could exploit this vulnerability to gain unauthorized access to sensitive information.