Skip to content

Instantly share code, notes, and snippets.

Avatar

Vulners Team vulnersCom

View GitHub Profile
@vulnersCom
vulnersCom / mikrot8over.py
Created Sep 28, 2020
Mikrotik exploit from Vault 7 CIA Leaks automation tool. Takeovers up to RouterOS 6.38.4
View mikrot8over.py
#!/usr/bin/env python
# -*- coding: utf-8 -*-
#
# VULNERS OPENSOURCE
# __________________
#
# Vulners Project [https://vulners.com]
# All Rights Reserved.
#
# Exploit Title: Mikrotik exploit from Vault 7 CIA Leaks automation tool. Takeovers up to RouterOS 6.38.4.
@vulnersCom
vulnersCom / pm_mf7b_wipe.py
Created Sep 17, 2019
Mifare S50 7byte UID Gen2 cloning, restoring, wiping back using Proxmark3 RDV4.0
View pm_mf7b_wipe.py
#! /usr/bin/env python3.6
# -*- coding: utf-8 -*-
#
# VULNERS OPENSOURCE
# __________________
#
# Vulners Project [https://vulners.com]
# All Rights Reserved.
#
# Author: Kir [isox@vulners.com]
@vulnersCom
vulnersCom / persistentCookie.py
Last active Jan 24, 2019
Beta version of persistent cookie module
View persistentCookie.py
# -*- coding: utf-8 -*-
# ===============================
# Persistent cookie jar for Requests by Kir Ermakov <isox@vulners.com>
# It holds cookies in temp file and recovers on process start
#
# Usage:
#
# import requests
#
# opener = requests.session()
View vulners_scanner.py
"""
vulners_scanner.py
Copyright 2018 Kir Ermakov (isox@vulners.com), Ilya Govorkov (gmedian@vulners.com)
This file is part of w3af, http://w3af.org/ .
w3af is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation version 2 of the License.
View Petya_ransomware.md

#petya #petrWrap #notPetya

Win32/Diskcoder.Petya.C

Ransomware attack.

About

This gist was built by the community of the researchers and was scribed by Kir and Igor from the QIWI/Vulners. We are grateful for the help of all those who sent us the data, links and information. Together we can make this world a better place!

Gist updates

View gist:2149fa8afb3e240e6213b30ea3e16f8c
Your website unpatched vulnerabilities at the Openbugbounty:
[type:openbugbounty AND title:"your-domain-here.com" AND openbugbounty.patchStatus:unpatched](http://bit.ly/2d12FF9)
Software vulnerabilities, Firefox as example:
[affectedSoftware.name:"firefox" OR affectedPackage.packageName:"firefox" OR cpe:*firefox* order:published](http://bit.ly/2cQvJ4e)
Software vulnerabilities, for exact version. Nginx 1.11.0 vulnerabilities:
[affectedSoftware.name:nginx AND affectedSoftware.version:"1.11.0"](http://bit.ly/2dEX8oz)
You can’t perform that action at this time.