mirror of
				https://github.com/mgeeky/Penetration-Testing-Tools.git
				synced 2025-11-04 04:55:26 +01:00 
			
		
		
		
	updates
This commit is contained in:
		@@ -31,7 +31,7 @@
 | 
			
		||||
#   mysql:x:101:65534:Linux User,,,:/home/mysql:/bin/false
 | 
			
		||||
#
 | 
			
		||||
#
 | 
			
		||||
# Mariusz B., 2016
 | 
			
		||||
# Mariusz Banach, 2016
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
@@ -132,7 +132,7 @@ def parseOptions(argv):
 | 
			
		||||
    print('''
 | 
			
		||||
        :: Blind-XXE attacker's helper backend component
 | 
			
		||||
        Helps exfiltrate files by abusing out-of-bands XML External Entity vulnerabilities.
 | 
			
		||||
        Mariusz B. / mgeeky '16-18, <mb@binary-offensive.com>
 | 
			
		||||
        Mariusz Banach / mgeeky '16-18, <mb@binary-offensive.com>
 | 
			
		||||
''')
 | 
			
		||||
 | 
			
		||||
    parser = argparse.ArgumentParser(prog = argv[0], usage='%(prog)s [options] <file>')
 | 
			
		||||
 
 | 
			
		||||
@@ -1,7 +1,7 @@
 | 
			
		||||
#!/usr/bin/python
 | 
			
		||||
#
 | 
			
		||||
#   Padding Oracle test-cases generator.
 | 
			
		||||
#   Mariusz B. / mgeeky, 2016
 | 
			
		||||
#   Mariusz Banach / mgeeky, 2016
 | 
			
		||||
#   v0.2
 | 
			
		||||
# 
 | 
			
		||||
#   Simple utility that aids the penetration tester when manually testing Padding Oracle condition
 | 
			
		||||
@@ -277,7 +277,7 @@ def hex_dump(data):
 | 
			
		||||
 | 
			
		||||
def main():
 | 
			
		||||
    info('\n\tPadding Oracle test-cases generator')
 | 
			
		||||
    info('\tMariusz B. / mgeeky, 2016\n')
 | 
			
		||||
    info('\tMariusz Banach / mgeeky, 2016\n')
 | 
			
		||||
 | 
			
		||||
    if len(sys.argv) < 2:
 | 
			
		||||
        warning('usage: padding-oracle-tests.py <data> [blocksize]')
 | 
			
		||||
 
 | 
			
		||||
@@ -14,7 +14,7 @@
 | 
			
		||||
     *   to add forced redirection to the target site.
 | 
			
		||||
     *
 | 
			
		||||
     * Authors:
 | 
			
		||||
     *  Mariusz B. / mgeeky
 | 
			
		||||
     *  Mariusz Banach / mgeeky
 | 
			
		||||
     *  Jakub M. / unkn0w
 | 
			
		||||
     *
 | 
			
		||||
     * Version:
 | 
			
		||||
 
 | 
			
		||||
@@ -80,7 +80,7 @@ hostname|23:55|~/dev/py-collaborator # python3.7 py-collaborator-server.py -d
 | 
			
		||||
 | 
			
		||||
        :: Cracking the Lens pingback responding server
 | 
			
		||||
        Responds to every Out-of-band request correlating them along the way
 | 
			
		||||
        Mariusz B. / mgeeky '16-18, <mb@binary-offensive.com>
 | 
			
		||||
        Mariusz Banach / mgeeky '16-18, <mb@binary-offensive.com>
 | 
			
		||||
 | 
			
		||||
[-] You shall specify all needed MySQL connection data either via program options or config file.
 | 
			
		||||
[+] Database initialized.
 | 
			
		||||
 
 | 
			
		||||
@@ -211,7 +211,7 @@ def parseOptions(argv):
 | 
			
		||||
    print('''
 | 
			
		||||
        :: Cracking the Lens pingback responding server
 | 
			
		||||
        Responds to every Out-of-band request correlating them along the way
 | 
			
		||||
        Mariusz B. / mgeeky '16-18, <mb@binary-offensive.com>
 | 
			
		||||
        Mariusz Banach / mgeeky '16-18, <mb@binary-offensive.com>
 | 
			
		||||
''')
 | 
			
		||||
 | 
			
		||||
    parser = argparse.ArgumentParser(prog = argv[0], usage='%(prog)s [options]')
 | 
			
		||||
 
 | 
			
		||||
@@ -18,7 +18,7 @@
 | 
			
		||||
#   - jwt
 | 
			
		||||
#   - anytree
 | 
			
		||||
#
 | 
			
		||||
# Mariusz B., 2018
 | 
			
		||||
# Mariusz Banach, 2018
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
import os
 | 
			
		||||
 
 | 
			
		||||
@@ -26,7 +26,7 @@
 | 
			
		||||
#       $ ./ysoserial-generator.py -u -b -y ~/tools/ysoserial/ysoserial.jar -s --lhost 192.168.56.1:8000
 | 
			
		||||
#           :: ysoserial payloads generation helper
 | 
			
		||||
#           Helps generate many variations of payloads to try against vulnerable application.
 | 
			
		||||
#           Mariusz B. / mgeeky '18, <mb@binary-offensive.com>
 | 
			
		||||
#           Mariusz Banach / mgeeky '18, <mb@binary-offensive.com>
 | 
			
		||||
#           v0.1
 | 
			
		||||
#
 | 
			
		||||
#       [+] Command within payload:
 | 
			
		||||
@@ -55,7 +55,7 @@
 | 
			
		||||
#
 | 
			
		||||
#
 | 
			
		||||
# Author: 
 | 
			
		||||
#    Mariusz B., '18-19 / <mb@binary-offensive.com>
 | 
			
		||||
#    Mariusz Banach, '18-19 / <mb@binary-offensive.com>
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
import os
 | 
			
		||||
@@ -379,7 +379,7 @@ def parseOptions(argv):
 | 
			
		||||
    print('''
 | 
			
		||||
        :: ysoserial payloads generation helper
 | 
			
		||||
        Helps generate many variations of payloads to try against vulnerable application.
 | 
			
		||||
        Mariusz B. / mgeeky '18, <mb@binary-offensive.com>
 | 
			
		||||
        Mariusz Banach / mgeeky '18, <mb@binary-offensive.com>
 | 
			
		||||
        v{}
 | 
			
		||||
'''.format(VERSION))
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user