mirror of
https://github.com/mgeeky/Penetration-Testing-Tools.git
synced 2025-09-04 11:08:39 +02:00
updates
This commit is contained in:
@ -31,7 +31,7 @@
|
||||
# mysql:x:101:65534:Linux User,,,:/home/mysql:/bin/false
|
||||
#
|
||||
#
|
||||
# Mariusz B., 2016
|
||||
# Mariusz Banach, 2016
|
||||
#
|
||||
|
||||
|
||||
@ -132,7 +132,7 @@ def parseOptions(argv):
|
||||
print('''
|
||||
:: Blind-XXE attacker's helper backend component
|
||||
Helps exfiltrate files by abusing out-of-bands XML External Entity vulnerabilities.
|
||||
Mariusz B. / mgeeky '16-18, <mb@binary-offensive.com>
|
||||
Mariusz Banach / mgeeky '16-18, <mb@binary-offensive.com>
|
||||
''')
|
||||
|
||||
parser = argparse.ArgumentParser(prog = argv[0], usage='%(prog)s [options] <file>')
|
||||
|
@ -1,7 +1,7 @@
|
||||
#!/usr/bin/python
|
||||
#
|
||||
# Padding Oracle test-cases generator.
|
||||
# Mariusz B. / mgeeky, 2016
|
||||
# Mariusz Banach / mgeeky, 2016
|
||||
# v0.2
|
||||
#
|
||||
# Simple utility that aids the penetration tester when manually testing Padding Oracle condition
|
||||
@ -277,7 +277,7 @@ def hex_dump(data):
|
||||
|
||||
def main():
|
||||
info('\n\tPadding Oracle test-cases generator')
|
||||
info('\tMariusz B. / mgeeky, 2016\n')
|
||||
info('\tMariusz Banach / mgeeky, 2016\n')
|
||||
|
||||
if len(sys.argv) < 2:
|
||||
warning('usage: padding-oracle-tests.py <data> [blocksize]')
|
||||
|
@ -14,7 +14,7 @@
|
||||
* to add forced redirection to the target site.
|
||||
*
|
||||
* Authors:
|
||||
* Mariusz B. / mgeeky
|
||||
* Mariusz Banach / mgeeky
|
||||
* Jakub M. / unkn0w
|
||||
*
|
||||
* Version:
|
||||
|
@ -80,7 +80,7 @@ hostname|23:55|~/dev/py-collaborator # python3.7 py-collaborator-server.py -d
|
||||
|
||||
:: Cracking the Lens pingback responding server
|
||||
Responds to every Out-of-band request correlating them along the way
|
||||
Mariusz B. / mgeeky '16-18, <mb@binary-offensive.com>
|
||||
Mariusz Banach / mgeeky '16-18, <mb@binary-offensive.com>
|
||||
|
||||
[-] You shall specify all needed MySQL connection data either via program options or config file.
|
||||
[+] Database initialized.
|
||||
|
@ -211,7 +211,7 @@ def parseOptions(argv):
|
||||
print('''
|
||||
:: Cracking the Lens pingback responding server
|
||||
Responds to every Out-of-band request correlating them along the way
|
||||
Mariusz B. / mgeeky '16-18, <mb@binary-offensive.com>
|
||||
Mariusz Banach / mgeeky '16-18, <mb@binary-offensive.com>
|
||||
''')
|
||||
|
||||
parser = argparse.ArgumentParser(prog = argv[0], usage='%(prog)s [options]')
|
||||
|
@ -18,7 +18,7 @@
|
||||
# - jwt
|
||||
# - anytree
|
||||
#
|
||||
# Mariusz B., 2018
|
||||
# Mariusz Banach, 2018
|
||||
#
|
||||
|
||||
import os
|
||||
|
@ -26,7 +26,7 @@
|
||||
# $ ./ysoserial-generator.py -u -b -y ~/tools/ysoserial/ysoserial.jar -s --lhost 192.168.56.1:8000
|
||||
# :: ysoserial payloads generation helper
|
||||
# Helps generate many variations of payloads to try against vulnerable application.
|
||||
# Mariusz B. / mgeeky '18, <mb@binary-offensive.com>
|
||||
# Mariusz Banach / mgeeky '18, <mb@binary-offensive.com>
|
||||
# v0.1
|
||||
#
|
||||
# [+] Command within payload:
|
||||
@ -55,7 +55,7 @@
|
||||
#
|
||||
#
|
||||
# Author:
|
||||
# Mariusz B., '18-19 / <mb@binary-offensive.com>
|
||||
# Mariusz Banach, '18-19 / <mb@binary-offensive.com>
|
||||
#
|
||||
|
||||
import os
|
||||
@ -379,7 +379,7 @@ def parseOptions(argv):
|
||||
print('''
|
||||
:: ysoserial payloads generation helper
|
||||
Helps generate many variations of payloads to try against vulnerable application.
|
||||
Mariusz B. / mgeeky '18, <mb@binary-offensive.com>
|
||||
Mariusz Banach / mgeeky '18, <mb@binary-offensive.com>
|
||||
v{}
|
||||
'''.format(VERSION))
|
||||
|
||||
|
Reference in New Issue
Block a user