def __init__(self): self.parser = parser() self.badges = badges() self.helper = helper() self.pseudo_shell = pseudo_shell() self.web_tools = web_tools() self.details = { 'Name': "exploit/multi/vbulletin_widget_php/template_code_execution", 'Authors': ['enty8080'], 'Description': "vBulletin 5.5.4 till 5.6.2 widget_php widget_tabbedcontainer_tab_panel Remote Code Execution.", 'Dependencies': [''], 'Comments': [''], 'Risk': "high" } self.options = { 'RHOST': { 'Description': "Remote host.", 'Value': None, 'Required': True }, 'RPORT': { 'Description': "Remote port.", 'Value': None, 'Required': True }, 'PHP_METHOD': { 'Description': "PHP method to execute command.", 'Value': "shell_exec", 'Required': True }, 'INSTALL_URL': { 'Description': "URL to vBulletin installation.", 'Value': "/", 'Required': True }, 'COMMAND': { 'Description': "Command to execute.", 'Value': "uname -a", 'Required': True }, 'PSEUDO': { 'Description': "Spawn Pseudo shell.", 'Value': "no", 'Required': False } }
def __init__(self): self.parser = parser() self.badges = badges() self.pseudo_shell = pseudo_shell() self.web_tools = web_tools() self.details = { 'Name': "exploit/multi/nostromo_httpd/remote_code_execution", 'Authors': [ 'enty8080' ], 'Description': "Remote Code Execution in Nostromo httpd.", 'Dependencies': [ '' ], 'Comments': [ '' ], 'Risk': "high" } self.options = { 'RHOST': { 'Description': "Remote host.", 'Value': None, 'Required': True }, 'RPORT': { 'Description': "Remote port.", 'Value': 80, 'Required': True }, 'COMMAND': { 'Description': "Command to execute", 'Value': None, 'Required': True }, 'PSEUDO': { 'Description': "Spawn Pseudo shell.", 'Value': "no", 'Required': False } }
def __init__(self): self.badges = badges() self.parser = parser() self.pseudo_shell = pseudo_shell() self.client = None self.details = { 'Name': "exploit/iphoneos/ssh/cydia_default_password", 'Authors': ['enty8080'], 'Description': "Bypass iPhoneOS SSH authorization using Cydia.app default SSH password.", 'Dependencies': ['paramiko'], 'Comments': [''], 'Risk': "medium" } self.options = { 'RHOST': { 'Description': "Remote host.", 'Value': None, 'Required': True }, 'RPORT': { 'Description': "Remote port.", 'Value': 22, 'Required': True }, 'USERNAME': { 'Description': "Shell username.", 'Value': "mobile", 'Required': True }, 'COMMAND': { 'Description': "Command to execute.", 'Value': "whoami", 'Required': True }, 'PSEUDO': { 'Description': "Spawn Pseudo shell.", 'Value': "no", 'Required': False } }
def __init__(self): self.parser = parser() self.badges = badges() self.pseudo_shell = pseudo_shell() self.web_utils = web_tools() self.buffer_size = 2048 self.client = None self.details = { 'Name': "exploit/multi/ssh/libssh_code_execution", 'Authors': ['enty8080'], 'Description': "SSH LibSSH unauthorized access Remote Code Execution.", 'Dependencies': ['paramiko'], 'Comments': [''], 'Risk': "medium" } self.options = { 'RHOST': { 'Description': "Remote host.", 'Value': None, 'Required': True }, 'RPORT': { 'Description': "Remote port.", 'Value': 2222, 'Required': True }, 'COMMAND': { 'Description': "Command to execute", 'Value': "id", 'Required': True }, 'PSEUDO': { 'Description': "Spawn Pseudo shell.", 'Value': "no", 'Required': False } }
def __init__(self): self.parser = parser() self.badges = badges() self.helper = helper() self.pseudo_shell = pseudo_shell() self.web_tools = web_tools() self.details = { 'Name': "exploit/multi/f5_big_ip_tmui/remote_code_execution", 'Authors': ['enty8080'], 'Description': "Remote Code Execution in F5 BIG-IP Traffic Management User Interface (TMUI).", 'Dependencies': ['requests'], 'Comments': [''], 'Risk': "high" } self.options = { 'RHOST': { 'Description': "Remote host.", 'Value': None, 'Required': True }, 'RPORT': { 'Description': "Remote port.", 'Value': None, 'Required': True }, 'COMMAND': { 'Description': "Command to execute.", 'Value': "whoami", 'Required': True }, 'PSEUDO': { 'Description': "Spawn Pseudo shell.", 'Value': "no", 'Required': False } }
def __init__(self): self.badges = badges() self.parser = parser() self.adb_tools = adb_tools() self.pseudo_shell = pseudo_shell() self.details = { 'Name': "exploit/android/adb/remote_code_execution", 'Authors': [ 'enty8080' ], 'Description': "Remote Code Execution in Android ADB.", 'Dependencies': [ '' ], 'Comments': [ '' ], 'Risk': "medium" } self.options = { 'RHOST': { 'Description': "Remote host.", 'Value': None, 'Required': True }, 'COMMAND': { 'Description': "Command to execute.", 'Value': "id -a", 'Required': True }, 'PSEUDO': { 'Description': "Spawn Pseudo shell.", 'Value': "no", 'Required': False } }
def __init__(self): self.io = io() self.parser = parser() self.badges = badges() self.pseudo_shell = pseudo_shell() self.buffer_size = 2048 self.details = { 'Name': "exploit/multi/ssh/cve_2018_10933", 'Authors': ['enty8080', 'jas502n'], 'Description': "SSH LibSSH unauthorized access.", 'Comments': [''] } self.options = { 'RHOST': { 'Description': "Remote host.", 'Value': None, 'Required': True }, 'RPORT': { 'Description': "Remote port.", 'Value': 2222, 'Required': True }, 'COMMAND': { 'Description': "Command to execute", 'Value': None, 'Required': True }, 'PSEUDO': { 'Description': "Spawn Pseudo shell.", 'Value': "no", 'Required': False } }