Skip to content

My collection of scripts, developed during CTFs, for exploiting vulnerabilities, chaining exploits, or automating tasks.

Notifications You must be signed in to change notification settings

byt3loss/OffensiveScripts

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Offensive Scripts

A collection of scripts written by me or modified versions of others' scripts, categorized by target or attack technique.

Index

CVE Exploits

CVE-2023-45878

Chains and automates Arbitrary File Write to RCE on Gibbon LMS through CVE-2023-45878 exploitation.

The script performs the following steps:

  1. Generates an msfvenom stageless reverse shell for Windows
  2. Uploads a webshell exploiting CVE-2023-45878
  3. Downloads the reverse shell on the target
  4. Executes the reverse shell

Usage: CVE-2023-45878.sh <lhost> <lport> <rhost[:rport]>.

Exploits XWiki RCE vulnerability and spawns a reverse shell on the target.

Python Werkzeug

Exploits an LFI endpoint to read system files and generate the Werkzeug PIN.

Exploits SQLi to read system files and generate Werkzeug PIN (from TryHackMe Advent Of Cyber 2023 Side Quest 4)

SSRF

Tool to enumerate subdomains exposed locally thru a POST parameter vulnerable to SSRF. The script uses RawHTTPy, a python package written by me to parse raw HTTP requests.

Three Bash scripts exploiting an SSRF vulnerability in the THM's RabbitStore CTF.

  • Automated exploit workflowssrf.sh: from account creation to SSRF payload delivery
  • Internal port scanning - port_scanner.sh: discover internal web services via SSRF
  • Directory enumeration - dir_scanner.sh: brute-force directories on an internal service through SSRF
Others

RCE exploitation automation for HackTheBox's Gavel CTF. Drops a web shell on the target for more command execution freedom, then spawns a mkfifo reverse shell through it.

About

My collection of scripts, developed during CTFs, for exploiting vulnerabilities, chaining exploits, or automating tasks.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published