I hereby claim:
- I am thel3l on github.
- I am thel3l (https://keybase.io/thel3l) on keybase.
- I have a public key whose fingerprint is 1DA2 4664 C293 EAFD 8E5B C7A7 BF6F B0EF D1AF C501
To claim this, I am signing this object:
root@kali:~# nmap -T4 -A -v -p0-65535 192.168.110.151 |
I hereby claim:
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
#!/usr/bin/env python | |
# coding=utf-8 | |
# pma3 - phpMyAdmin3 remote code execute exploit | |
# Author: wofeiwo<wofeiwo@80sec.com> | |
# Thx Superhei | |
# Tested on: 3.1.1, 3.2.1, 3.4.3 | |
# CVE: CVE-2011-2505, CVE-2011-2506 | |
# Date: 2011-07-08 | |
# Have fun, DO *NOT* USE IT TO DO BAD THING. | |
################################################ |
#!/usr/bin/python | |
############################################################ | |
# Exploit Title: FreePBX / Elastix pre-authenticated remote code execution exploit | |
# Google Dork: oy vey | |
# Date: March 23rd, 2012 | |
# Author: muts | |
# Version: FreePBX 2.10.0/ 2.9.0, Elastix 2.2.0, possibly others. | |
# Tested on: multiple | |
# CVE : notyet | |
# Blog post : http://www.offensive-security.com/vulndev/freepbx-exploit-phone-home/ |
#!/usr/bin/python | |
############################################################################################### | |
# MS08-067 Exploit - Auto Reverse NetCat Payload Mod by 3mrgnc3 # | |
# Designed for Kali Linux - msfvenom and nc required to function # | |
# Based on Ported Exploit By EKOZ https://github.com/jivoi https://jivoi.github.io/ # | |
# Modified verion of Debasis Mohanty\'s code (https://www.exploit-db.com/exploits/7132/). # | |
# The ret addr & ROP parts are ported from MSF Module exploit/windows/smb/ms08_067_netapi # | |
############################################################################################### | |
import struct |
#!/usr/bin/python | |
from impacket import smb, smbconnection | |
from mysmb import MYSMB | |
from struct import pack, unpack, unpack_from | |
import sys | |
import socket | |
import time | |
''' | |
MS17-010 exploit for Windows 2000 and later by sleepya |
#!/usr/bin/python | |
from impacket import smb, smbconnection | |
from mysmb import MYSMB | |
from struct import pack, unpack, unpack_from | |
import sys | |
import socket | |
import time | |
''' | |
MS17-010 exploit for Windows 2000 and later by sleepya |
# impacket SMB extension for MS17-010 exploit. | |
# this file contains only valid SMB packet format operation. | |
from impacket import smb, smbconnection | |
from impacket.dcerpc.v5 import transport | |
from struct import pack | |
import os | |
import random | |
def getNTStatus(self): |