syrius01

Results 13 issues of syrius01

Hi ! Thanks for sharing those PoCs with the community :) I was wondering if you know how to exploit Drupal 6.* ? So far; Drupal 7 is with /user/password...

enhancement
help wanted

Hi Sniffdog! I added the algo 'x16s' in my bat file but it still doesn't show the algo when miner/benchmark is starting. I believe the sniffdog-miner would need an update...

Hi, I was wondering if it would be possible to add some extra arguments for an input IP list and for threads: --hosts_file --threads 100 (or what ever number of...

Priority: Low
Status: Review Needed
Type: Feature

Hi johndekroon! I would like to let you know that this is the best tool I've found so far for testing multiple java deserialization bugs :) Since the tool is...

Hi, I was wondering if you know a way how to sort all the data from the output.txt results of "-q filename:mup.json' -o output.txt -m mup" so it could read...

Hi, This is the output I'm getting when running "go get github.com/gravitational/cve-2018-1002105" ``` # github.com/gravitational/cve-2018-1002105/vendor/sigs.k8s.io/yaml ../../go/src/github.com/gravitational/cve-2018-1002105/vendor/sigs.k8s.io/yaml/yaml.go:42:48: undefined: DisallowUnknownFields # github.com/gravitational/cve-2018-1002105/vendor/k8s.io/client-go/transport ../../go/src/github.com/gravitational/cve-2018-1002105/vendor/k8s.io/client-go/transport/round_trippers.go:437:9: undefined: strings.Builder ``` Any help would be very appreciated....

Hi my friend :) I was wondering if you could add a feature in this awesome tool for CVE-2018-11776? It would be very appreciated ! Thanks

Hi, First I would like to thank you for sharing this PoC so we can know if our environment is safe. I tried running the exp.py script but I am...

[*] Started reverse TCP handler on 192.168.1.150:4444 [*] 192.168.1.31:445 - Generating Eternalblue XML data [*] 192.168.1.31:445 - Generating Doublepulsar XML data [*] 192.168.1.31:445 - Generating payload DLL for Doublepulsar [*]...

Hi, Really good read based on your blog post (https://www.immunit.ch/blog/2018/11/01/cve-2018-11759-apache-mod_jk-access-bypass/). Now, I am wondering if some kind of remote code execution would be possible via the jkmount function? Since jkmount...