Skip to content

hawkwheels/Exploit_Scripts

Repository files navigation

Exploit_scripts

SQL Exploite Usage

script file <URL> <payload>

  • URI. URI parameter and expected exploited response text has to be provided inside the script file

Example:

filename.py www.example.com "'1=1"

PHP Reverse shell

Reverse shell script writern in PHP (replace you reverse shell IP and listerning port)

Clipboard Changer

Scripts which exploits the copy event handler

expect_su

Scripts which uses expect command to get a intertive session on a restricted web shell expect_su.sh password command

XSS_Cookie_Stealer

Script which exploits XSS to steal cookies

XSS_Password_Stealer

Scripts which exploits XSS to steal username and password (by abusing the password managers autofill functionality)

XSS_come_CSRF

Script which exploits the XSS vulnerability to bypass CSRF prevention to do CSRF attack

Drive_by_download

Open the script and feed the filedata variable with base64 encoded data of the binary which need to be downloaded just by visiting the page (tweak as required)

Pyware

Python based script, upon execution will encrypt the files avaialble on the execution directory and leave a key to decrypt

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published