I hereby claim:
- I am graph-x on github.
- I am graphx (https://keybase.io/graphx) on keybase.
- I have a public key ASDjDEWpDUf7b91K4LK5bHcthokRT6MiuEANveNHLh0rhQo
To claim this, I am signing this object:
| from Microsoft.Win32 import Registry | |
| from time import sleep | |
| rkey = Registry.CurrentUser.CreateSubKey("SOFTWARE\\aatest") | |
| rkey.SetValue(u'\x00 this is a test',u'\x00look at me!') | |
| rkey.Close() | |
| rkey = Registry.CurrentUser.CreateSubKey("SOFTWARE\\aatest") | |
| values = rkey.GetValueNames() | |
| print("We have {0} values.".format(str(len(values)))) | |
| print("The value names returned are: {0}.".format(values[0])) | |
| value = rkey.GetValue(u'\x00 this is a test') |
| <html> | |
| <head> | |
| <title>This is the attacker page</title> | |
| </head> | |
| <body> | |
| <p> This is the attacker's page</p> | |
| <!-- This button is only here for the POC. You can just execute the script without further interaction from the end user by just calling the function. --!> | |
| <button type="button" onclick="csrf()">I double dare you</button> | |
| <br> | |
| <textarea id='demo'></textarea> |
| <?php | |
| session_start(['cookie_secure' => true, 'cookie_path' => '/', 'cookie_httponly' => true]); | |
| if ($_SERVER['HTTP_REQUEST'] === "POST"){ | |
| if (isset($_POST['user']) && isset($_POST['pass'])){ | |
| //for this POC we assume successful login and regenerate the session id | |
| session_regenerate_id(); | |
| $_SESSION['user'] = $_POST['user']; | |
| $_SESSION['authorized'] = true; | |
| echo("Session is now authorized"); |
| #!/usr/bin/python | |
| ####################################################################### | |
| # Philips Hue Automation Script # | |
| # Uses DHCP log forwarding from DHCP server to figure out if the # | |
| # device is on network (home) or off (away). Also uses a hold down # | |
| # timer to pervent the lights being triggered every fucking time # | |
| # the phone gets a new DHCP lease. Like always, I'm putting this # | |
| # shit code out there for public consumption and ridicule under # | |
| # the YPL. Maybe you'll find it useful or maybe not. no matter. # | |
| # zero fux given # |
I hereby claim:
To claim this, I am signing this object:
| #!/usr/bin/python | |
| from string import maketrans | |
| import urllib | |
| import binascii | |
| import re | |
| import base64 | |
| lpp = dict() | |
| ############################################################# | |
| # Advisory Title: Teleopti WFM (Multiple Vulnerabilities) | |
| # Date: 2/4/2017 | |
| # Researcher: Graph-X ((email: [email protected])) | |
| # Vendor Homepage: http://www.teleopti.com | |
| # Version: <= 7.1.0 | |
| # CVE: is dead | |
| ############################################################# | |
| Disclosure Timeline | |
| ############################################################################################ |
| #!/usr/bin/env python | |
| import binascii | |
| from struct import * | |
| import os, sys | |
| #import ctypes | |
| import zlib | |
| import struct | |
| import array | |
| import argparse | |
| ################################################################# |
| #Pivotbox changes: | |
| openvpn --mktun --dev tun0 | |
| ifconfig tun0 1.1.1.2 netmask 255.255.255.252 up | |
| #IP Forwarding and PermitTunnel yes only need to be done once | |
| echo 1 > /proc/sys/net/ipv4/ip_forward | |
| echo "PermitTunnel yes" >> /etc/ssh/sshd_config | |
| service sshd reload | |
| iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE | |
| #!/bin/bash | |
| # Name: SearchSploit - Exploit-DB's CLI search tool | |
| # Version: 3.3 (Release date: 2016-04-02) | |
| # Written by: Offensive Security, Unix-Ninja & g0tmi1k | |
| # Homepage: https://github.com/offensive-security/exploit-database | |
| # | |
| ## NOTE: | |
| # Exit code '0' means finished normally | |
| # Exit code '1' means something went wrong | |
| # Exit code '2' means finished help screen |