Skip to content

Instantly share code, notes, and snippets.

Vulners Team vulnersCom

Block or report user

Report or block vulnersCom

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
@vulnersCom
vulnersCom / pm_mf7b_wipe.py
Created Sep 17, 2019
Mifare S50 7byte UID Gen2 cloning, restoring, wiping back using Proxmark3 RDV4.0
View pm_mf7b_wipe.py
#! /usr/bin/env python3.6
# -*- coding: utf-8 -*-
#
# VULNERS OPENSOURCE
# __________________
#
# Vulners Project [https://vulners.com]
# All Rights Reserved.
#
# Author: Kir [isox@vulners.com]
@vulnersCom
vulnersCom / persistentCookie.py
Last active Jan 24, 2019
Beta version of persistent cookie module
View persistentCookie.py
# -*- coding: utf-8 -*-
# ===============================
# Persistent cookie jar for Requests by Kir Ermakov <isox@vulners.com>
# It holds cookies in temp file and recovers on process start
#
# Usage:
#
# import requests
#
# opener = requests.session()
View vulners_scanner.py
"""
vulners_scanner.py
Copyright 2018 Kir Ermakov (isox@vulners.com), Ilya Govorkov (gmedian@vulners.com)
This file is part of w3af, http://w3af.org/ .
w3af is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation version 2 of the License.
View Petya_ransomware.md

#petya #petrWrap #notPetya

Win32/Diskcoder.Petya.C

Ransomware attack.

About

This gist was built by the community of the researchers and was scribed by Kir and Igor from the QIWI/Vulners. We are grateful for the help of all those who sent us the data, links and information. Together we can make this world a better place!

Gist updates

View gist:2149fa8afb3e240e6213b30ea3e16f8c
Your website unpatched vulnerabilities at the Openbugbounty:
[type:openbugbounty AND title:"your-domain-here.com" AND openbugbounty.patchStatus:unpatched](http://bit.ly/2d12FF9)
Software vulnerabilities, Firefox as example:
[affectedSoftware.name:"firefox" OR affectedPackage.packageName:"firefox" OR cpe:*firefox* order:published](http://bit.ly/2cQvJ4e)
Software vulnerabilities, for exact version. Nginx 1.11.0 vulnerabilities:
[affectedSoftware.name:nginx AND affectedSoftware.version:"1.11.0"](http://bit.ly/2dEX8oz)
You can’t perform that action at this time.