This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import urllib.request, json, sys, textwrap | |
# Run like | |
# python3 pubsploit.py CVE-2017-0143 | |
def cveSearch(cve): | |
with urllib.request.urlopen('http://cve.circl.lu/api/cve/'+cve) as url: | |
data = json.loads(url.read().decode()) | |
try: | |
if data['cvss']: | |
print("{} | CVSS {}".format(cve,data['cvss'])) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#This script helps generate unicode which is essentially hidden or "invisible" but is easily read by LLM's especially those that do not rely on a UI or Prescreening of prompts via API submission. | |
#This wont be published until someone else discovers it as its too "valuable" to threat actors to publish given currently available mitigations. | |
# V1.0: TLP RED! Do Not Distribute! Category: Hidden Injection Prompt! - 09/2023 - ShadowOpz | |
# V2.0: TLP RED! Feature update: Added invisible clipboard functionality. | |
# V3.0: Public Disclosure from Twitter discovered. Notes below. | |
# V3.0 Notes: Released to public Gist 01/12/2024 after public disclosure from Twitter. | |
# Kudos to @rezo_ and @goodside for the discovery and their pyperclip version. | |