All Projects β†’ wofeiwo β†’ Webcgi Exploits

wofeiwo / Webcgi Exploits

Licence: apache-2.0
Multi-language web CGI interfaces exploits.

Labels

Projects that are alternatives of or similar to Webcgi Exploits

destiny-macros
A collection of Destiny 2 macros built with AutoHotKey
Stars: ✭ 24 (-91.04%)
Mutual labels:  exploit
awesome-list-of-secrets-in-environment-variables
πŸ¦„πŸ”’ Awesome list of secrets in environment variables πŸ–₯️
Stars: ✭ 538 (+100.75%)
Mutual labels:  exploit
Shiro exploit
Apache Shiro εεΊεˆ—εŒ–ζΌζ΄žζ£€ζ΅‹δΈŽεˆ©η”¨ε·₯ε…·
Stars: ✭ 252 (-5.97%)
Mutual labels:  exploit
All-Discord-Exploits
This is a list of Discord console scripts, bugs and exploits.
Stars: ✭ 34 (-87.31%)
Mutual labels:  exploit
Exploits
Real world and CTFs exploiting web/binary POCs.
Stars: ✭ 69 (-74.25%)
Mutual labels:  exploit
Eternalblue
Eternalblue written in CSharp. Contains version detection, vulnerability scanner and exploit of MS17-010
Stars: ✭ 150 (-44.03%)
Mutual labels:  exploit
YAPS
Yet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-86.94%)
Mutual labels:  exploit
Exploit Cve 2017 7494
SambaCry exploit and vulnerable container (CVE-2017-7494)
Stars: ✭ 265 (-1.12%)
Mutual labels:  exploit
moonwalk
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. πŸ‘»πŸš
Stars: ✭ 544 (+102.99%)
Mutual labels:  exploit
FlameCord
Patch for Waterfall to improve performance during attacks and fix memory issues.
Stars: ✭ 103 (-61.57%)
Mutual labels:  exploit
SQL Injection Payload
SQL Injection Payload List
Stars: ✭ 62 (-76.87%)
Mutual labels:  exploit
external-protocol-flooding
Scheme flooding vulnerability: how it works and why it is a threat to anonymous browsing
Stars: ✭ 603 (+125%)
Mutual labels:  exploit
Exploit-Development
Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)
Stars: ✭ 84 (-68.66%)
Mutual labels:  exploit
om5p-ac-v2-unlocker
Open Mesh OM5P-AC v2 Unlocker (U-Boot 1.1.4 based)
Stars: ✭ 32 (-88.06%)
Mutual labels:  exploit
Shellver
Reverse Shell Cheat Sheet TooL
Stars: ✭ 258 (-3.73%)
Mutual labels:  exploit
log4j2-rce-exploit
log4j2 remote code execution or IP leakage exploit (with examples)
Stars: ✭ 62 (-76.87%)
Mutual labels:  exploit
xsymlink
Xbox One Symbolic Link Exploit: Access restricted/encrypted volumes using the Xbox File Explorer.
Stars: ✭ 18 (-93.28%)
Mutual labels:  exploit
Jenkins Rce
😈 Jenkins RCE PoC. From unauthenticated user to remote code execution, it's a hacker's dream!
Stars: ✭ 262 (-2.24%)
Mutual labels:  exploit
Remot3d
Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors
Stars: ✭ 263 (-1.87%)
Mutual labels:  exploit
CVE-2018-7750
an RCE (remote command execution) approach of CVE-2018-7750
Stars: ✭ 18 (-93.28%)
Mutual labels:  exploit

Web CGI Exploits

License README README

Here's several exploits related to different web CGIs. I wrote those exploits in last few years.

How it works

Web app are basicly those layers:

  1. applications
  2. web frameworks
  3. script language engines
  4. web containers(servers)
  5. web front proxy(nginx etc.)
  • 4 and 5 could be the same thing.3 and 4 could the same thing too.

There are communications between each layer. each layer software are developed by different teams. they do have standards to communicate each other, but they always have misunderstandings or design faults. So we can take advantage of those faults to achieve our goals, like RCE, spwan a shell, port forward etc.

Exploits

PHP

  • Fastcgi

    1. fcgi_exp.go use fastcgi to read or execute file if the fcgi port exposed to public( or with a SSRF).
    2. fcgi_jailbreak.php use fastcgi params to change some php ini configs and break php-based sandbox.
  • Apache Mod_php

    1. mod_php_port_reuse.php reuse the 80 connection to spawn a interactive shell. Bypass the firewall.
    2. mod_php_port_proxy.py work together with mod_php_port_reuse.php, create a 80 tcp proxy to bypass the firewall.

Python

  • Uwsgi
    1. uwsgi_exp.py exploit uwsgi to execute any command remotely if the uwsgi port exposed to public( or with a SSRF).
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].