Skip to content

Instantly share code, notes, and snippets.

Vulners Team vulnersCom

Block or report user

Report or block vulnersCom

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
vulnersCom /
Created Sep 17, 2019
Mifare S50 7byte UID Gen2 cloning, restoring, wiping back using Proxmark3 RDV4.0
#! /usr/bin/env python3.6
# -*- coding: utf-8 -*-
# __________________
# Vulners Project []
# All Rights Reserved.
# Author: Kir []
vulnersCom /
Last active Jan 24, 2019
Beta version of persistent cookie module
# -*- coding: utf-8 -*-
# ===============================
# Persistent cookie jar for Requests by Kir Ermakov <>
# It holds cookies in temp file and recovers on process start
# Usage:
# import requests
# opener = requests.session()
Copyright 2018 Kir Ermakov (, Ilya Govorkov (
This file is part of w3af, .
w3af is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation version 2 of the License.

#petya #petrWrap #notPetya


Ransomware attack.


This gist was built by the community of the researchers and was scribed by Kir and Igor from the QIWI/Vulners. We are grateful for the help of all those who sent us the data, links and information. Together we can make this world a better place!

Gist updates

View gist:2149fa8afb3e240e6213b30ea3e16f8c
Your website unpatched vulnerabilities at the Openbugbounty:
[type:openbugbounty AND title:"" AND openbugbounty.patchStatus:unpatched](
Software vulnerabilities, Firefox as example:
["firefox" OR affectedPackage.packageName:"firefox" OR cpe:*firefox* order:published](
Software vulnerabilities, for exact version. Nginx 1.11.0 vulnerabilities:
[ AND affectedSoftware.version:"1.11.0"](
You can’t perform that action at this time.