Skip to content
Some exploits, which I’ve created during my OSCE preparation.
Python
Branch: master
Clone or download

Latest commit

Fetching latest commit…
Cannot retrieve the latest commit at this time.

Files

Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
Exploits Move exploits to the Exploits folder Jul 7, 2018
Templates Add some exploit templates Jul 7, 2018
Tools Update README Jul 7, 2018
.gitignore Initial commit Apr 25, 2018
LICENSE Initial commit Apr 25, 2018
README.org Update README Jul 7, 2018

README.org

OSCE

Some [exploits|tools|templates], which I’ve created during my OSCE preparation.

Exploits

SoftwareVersionType
Easy File Sharing Web Server7.2Remote
KarjaSoft Sami FTP Server2.0.1Remote
Ultra Mini Httpd Program (minihttpd)1.2Remote
VulnServer TRUN - DEP Bypass-Remote
VulnServer KSTET - Egghunter-Remote
Free Float FTP Server1.0Remote
Dup Scout Enterprise10.0.18Remote
LabF nfsAxe FTP Client3.7Remote
Easy Chat Server3.1Remote
MinaliC Webserver2.0.0Remote
KnFTP Server1.0.0Remote
ProSysInfo TFTP Server0.4.2Remote
Light HTTPD0.1Remote
Easy CD DVD Copy1.3.24Local
R3.4.4Local
Audiograbber1.8.3Local

Templates

$ tree
├── local
│   ├── template_class_exploit.py
│   └── template_exploit.py
└── remote
    ├── ftp
    │   ├── client
    │   │   └── template_exploit.py
    │   └── server
    │       └── template_exploit.py
    ├── http
    │   ├── template_class_exploit.py
    │   └── template_exploit.py
    └── tftp
        └── template_exploit.py

Tools

NameDescription
egghunter.pyGenerate an egghunter with a new Signature
disassemble.pyDisassembly shellcode with capstone
bin2op.pyExtract the opcode from the objdump of a binary
port-converter.pyConvert a port/ip addr to the network order
You can’t perform that action at this time.