Skip to content

Instantly share code, notes, and snippets.

View vulnersCom's full-sized avatar

Vulners Team vulnersCom

View GitHub Profile
@vulnersCom
vulnersCom / gist:2149fa8afb3e240e6213b30ea3e16f8c
Created September 30, 2016 13:53
Vunlers.com useful queries
Your website unpatched vulnerabilities at the Openbugbounty:
[type:openbugbounty AND title:"your-domain-here.com" AND openbugbounty.patchStatus:unpatched](http://bit.ly/2d12FF9)
Software vulnerabilities, Firefox as example:
[affectedSoftware.name:"firefox" OR affectedPackage.packageName:"firefox" OR cpe:*firefox* order:published](http://bit.ly/2cQvJ4e)
Software vulnerabilities, for exact version. Nginx 1.11.0 vulnerabilities:
[affectedSoftware.name:nginx AND affectedSoftware.version:"1.11.0"](http://bit.ly/2dEX8oz)
"""
vulners_scanner.py
Copyright 2018 Kir Ermakov (isox@vulners.com), Ilya Govorkov (gmedian@vulners.com)
This file is part of w3af, http://w3af.org/ .
w3af is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation version 2 of the License.
@vulnersCom
vulnersCom / persistentCookie.py
Last active January 24, 2019 18:41
Beta version of persistent cookie module
# -*- coding: utf-8 -*-
# ===============================
# Persistent cookie jar for Requests by Kir Ermakov <isox@vulners.com>
# It holds cookies in temp file and recovers on process start
#
# Usage:
#
# import requests
#
# opener = requests.session()
@vulnersCom
vulnersCom / pm_mf7b_wipe.py
Created September 17, 2019 08:54
Mifare S50 7byte UID Gen2 cloning, restoring, wiping back using Proxmark3 RDV4.0
#! /usr/bin/env python3.6
# -*- coding: utf-8 -*-
#
# VULNERS OPENSOURCE
# __________________
#
# Vulners Project [https://vulners.com]
# All Rights Reserved.
#
# Author: Kir [isox@vulners.com]
@vulnersCom
vulnersCom / test.py
Last active May 18, 2021 16:11
Palindrome test
import os, psutil
import random
import string
large_string = "".join([random.choice(string.ascii_letters + string.punctuation) for _ in range(0, 500000)])
process = psutil.Process(os.getpid())
def is_palindrome(str_array):
str_array = str_array.lower()
@vulnersCom
vulnersCom / esxi_disk_management.md
Last active October 27, 2022 15:06
ESXi/vSphere/vSAN Disk Management Cheat Sheet

VULNERS OPENSOURCE, Vulners Project [https://vulners.com]

List storage and mount points.

esxcli storage filesystem list

List devices.

@vulnersCom
vulnersCom / mikrot8over.py
Created September 28, 2020 08:21
Mikrotik exploit from Vault 7 CIA Leaks automation tool. Takeovers up to RouterOS 6.38.4
#!/usr/bin/env python
# -*- coding: utf-8 -*-
#
# VULNERS OPENSOURCE
# __________________
#
# Vulners Project [https://vulners.com]
# All Rights Reserved.
#
# Exploit Title: Mikrotik exploit from Vault 7 CIA Leaks automation tool. Takeovers up to RouterOS 6.38.4.

#petya #petrWrap #notPetya

Win32/Diskcoder.Petya.C

Ransomware attack.

About

This gist was built by the community of the researchers and was scribed by Kir and Igor from the QIWI/Vulners. We are grateful for the help of all those who sent us the data, links and information. Together we can make this world a better place!

Gist updates