A collection of scripts written by me or modified versions of others' scripts, categorized by target or attack technique.
Chains and automates Arbitrary File Write to RCE on Gibbon LMS through CVE-2023-45878 exploitation.
The script performs the following steps:
- Generates an msfvenom stageless reverse shell for Windows
- Uploads a webshell exploiting CVE-2023-45878
- Downloads the reverse shell on the target
- Executes the reverse shell
Usage: CVE-2023-45878.sh <lhost> <lport> <rhost[:rport]>
.
Exploits an LFI endpoint to read system files and generate the Werkzeug PIN.
Exploits SQLi to read system files and generate Werkzeug PIN (from TryHackMe Advent Of Cyber 2023 Side Quest 4)
Tool to enumerate subdomains exposed locally thru a POST parameter vulnerable to SSRF. The script uses RawHTTPy, a python package written by me to parse raw HTTP requests.