Skip to content

Instantly share code, notes, and snippets.

View mdisec's full-sized avatar

Mehmet INCE mdisec

View GitHub Profile
@mdisec
mdisec / manageengine_appmanager_exec_0day.rb
Created April 19, 2019 20:33
ManageEngine Applications Manager Remote Code Execution 0day
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::HttpClient
include Msf::Exploit::FileDropper
alert(1)

Keybase proof

I hereby claim:

  • I am mmetince on github.
  • I am mehmet (https://keybase.io/mehmet) on keybase.
  • I have a public key ASCYw3yOgrkGgAPBBbyrV6HKGtNys38L1oxJ8Ucg5Pj26wo

To claim this, I am signing this object:

{
"title": "ALERTS",
"services": {
"query": {
"idQueue": [],
"list": {
"3": {
"id": 3,
"color": "#BF1B00",
"query": "event_type:\"alert\"",
@mdisec
mdisec / gist:b0d44cc14e4c4c10cd64
Last active February 10, 2023 21:59
Kibana with Nginx Reverse Proxy + SSL + HTTP Auth
# Nginx proxy for Elasticsearch + Kibana
#
# In this setup, we are password protecting the saving of dashboards. You may
# wish to extend the password protection to all paths.
#
# Even though these paths are being called as the result of an ajax request, the
# browser will prompt for a username/password on the first request
#
# If you use this, you'll want to point config.js at http://FQDN:443/ instead of
# http://FQDN:9200