echo rxerium.com | subfinder | httpx -nf | nuclei -tags tech,exposures,panel
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| id: CVE-2025-61884 | |
| info: | |
| name: Detection for CVE-2025-61884 | |
| author: rxerium | |
| severity: high | |
| description: | | |
| This vulnerability is remotely exploitable without authentication, i.e., it may be exploited over a network without the need for a username and password. If successfully exploited, this vulnerability may allow access to sensitive resources. | |
| metadata: | |
| shodan-query: html:"OA_HTML" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| sudo --version | head -n1 | awk '{print $3}' | awk -F'p' '{printf "%s.%s", $1, ($2=="")?0:$2}' | awk '{if ($1 < 1.9 || ($1 == 1.9 && $2 < 17.1)) print "VULNERABLE"; else print "NOT-VULNERABLE"}' |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import requests | |
| import json | |
| import time | |
| # Configuration | |
| API_KEY = "API_KEY" # Replace with your actual API key | |
| INPUT_FILE = "companies.txt" # File containing company names (one per line) | |
| OUTPUT_FILE = "output2.json" # JSON output file | |
| RATE_LIMIT_SECONDS = 60 # Wait time between requests to avoid rate limiting |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import requests | |
| import time | |
| def read_org_names(file_path): | |
| """Read organization names from a file (one per line).""" | |
| with open(file_path, 'r', encoding='utf-8') as file: | |
| return [line.strip() for line in file if line.strip()] | |
| def query_whoxy(api_key, org_name): | |
| """Query the Whoxy API for reverse WHOIS lookup based on organization name.""" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import requests | |
| import json | |
| # API Key | |
| api_key = "<ENTER_API_KEY>" | |
| url = "https://reverse-whois.whoisxmlapi.com/api/v2" | |
| # Read input list (one company per line) | |
| with open("input.txt", "r", encoding="utf-8") as file: | |
| company_names = [line.strip() for line in file if line.strip()] |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| id: CVE-2024-50623 | |
| info: | |
| name: CVE-2024-50623 | |
| author: rxerium | |
| severity: high | |
| description: | | |
| Unrestricted file upload and download vulnerability in Cleo Harmony, VLTrader, and LexiCom before version 5.8.0.21, leading to remote code execution | |
| reference: | |
| - https://support.cleo.com/hc/en-us/articles/27140294267799-Cleo-Product-Security-Advisory |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import shodan | |
| # Your Shodan API key | |
| api_key = 'YOUR_SHODAN_API_KEY' | |
| # Initialize the Shodan API | |
| api = shodan.Shodan(api_key) | |
| # Search queries for common web ports | |
| queries = [ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| from youtube_transcript_api import YouTubeTranscriptApi | |
| tc = YouTubeTranscriptApi.get_transcript("") | |
| file = open("transcript.txt", "w", encoding="utf-8") | |
| for i in tc: | |
| file.write(i['text'] + "\n") | |
NewerOlder