This commit is contained in:
Mariusz B. / mgeeky
2021-10-24 23:11:42 +02:00
parent 2e115fe796
commit 558762a498
78 changed files with 124 additions and 124 deletions

View File

@ -31,7 +31,7 @@
# mysql:x:101:65534:Linux User,,,:/home/mysql:/bin/false
#
#
# Mariusz B., 2016
# Mariusz Banach, 2016
#
@ -132,7 +132,7 @@ def parseOptions(argv):
print('''
:: Blind-XXE attacker's helper backend component
Helps exfiltrate files by abusing out-of-bands XML External Entity vulnerabilities.
Mariusz B. / mgeeky '16-18, <mb@binary-offensive.com>
Mariusz Banach / mgeeky '16-18, <mb@binary-offensive.com>
''')
parser = argparse.ArgumentParser(prog = argv[0], usage='%(prog)s [options] <file>')

View File

@ -1,7 +1,7 @@
#!/usr/bin/python
#
# Padding Oracle test-cases generator.
# Mariusz B. / mgeeky, 2016
# Mariusz Banach / mgeeky, 2016
# v0.2
#
# Simple utility that aids the penetration tester when manually testing Padding Oracle condition
@ -277,7 +277,7 @@ def hex_dump(data):
def main():
info('\n\tPadding Oracle test-cases generator')
info('\tMariusz B. / mgeeky, 2016\n')
info('\tMariusz Banach / mgeeky, 2016\n')
if len(sys.argv) < 2:
warning('usage: padding-oracle-tests.py <data> [blocksize]')

View File

@ -14,7 +14,7 @@
* to add forced redirection to the target site.
*
* Authors:
* Mariusz B. / mgeeky
* Mariusz Banach / mgeeky
* Jakub M. / unkn0w
*
* Version:

View File

@ -80,7 +80,7 @@ hostname|23:55|~/dev/py-collaborator # python3.7 py-collaborator-server.py -d
:: Cracking the Lens pingback responding server
Responds to every Out-of-band request correlating them along the way
Mariusz B. / mgeeky '16-18, <mb@binary-offensive.com>
Mariusz Banach / mgeeky '16-18, <mb@binary-offensive.com>
[-] You shall specify all needed MySQL connection data either via program options or config file.
[+] Database initialized.

View File

@ -211,7 +211,7 @@ def parseOptions(argv):
print('''
:: Cracking the Lens pingback responding server
Responds to every Out-of-band request correlating them along the way
Mariusz B. / mgeeky '16-18, <mb@binary-offensive.com>
Mariusz Banach / mgeeky '16-18, <mb@binary-offensive.com>
''')
parser = argparse.ArgumentParser(prog = argv[0], usage='%(prog)s [options]')

View File

@ -18,7 +18,7 @@
# - jwt
# - anytree
#
# Mariusz B., 2018
# Mariusz Banach, 2018
#
import os

View File

@ -26,7 +26,7 @@
# $ ./ysoserial-generator.py -u -b -y ~/tools/ysoserial/ysoserial.jar -s --lhost 192.168.56.1:8000
# :: ysoserial payloads generation helper
# Helps generate many variations of payloads to try against vulnerable application.
# Mariusz B. / mgeeky '18, <mb@binary-offensive.com>
# Mariusz Banach / mgeeky '18, <mb@binary-offensive.com>
# v0.1
#
# [+] Command within payload:
@ -55,7 +55,7 @@
#
#
# Author:
# Mariusz B., '18-19 / <mb@binary-offensive.com>
# Mariusz Banach, '18-19 / <mb@binary-offensive.com>
#
import os
@ -379,7 +379,7 @@ def parseOptions(argv):
print('''
:: ysoserial payloads generation helper
Helps generate many variations of payloads to try against vulnerable application.
Mariusz B. / mgeeky '18, <mb@binary-offensive.com>
Mariusz Banach / mgeeky '18, <mb@binary-offensive.com>
v{}
'''.format(VERSION))