Highlights
- Arctic Code Vault Contributor
Create your own GitHub profile
Sign up for your own profile on GitHub, the best place to host code, manage projects, and build software alongside 50 million developers.
Sign up
Pinned
1,393 contributions in the last year
Activity overview
Contributed to
smicallef/spiderfoot,
rapid7/metasploit-framework,
SerenityOS/serenity
and 5 other
repositories
Contribution activity
August 2020
Created a pull request in rapid7/metasploit-framework that received 2 comments
Msf::Post::File.file_local_write: Use Rex::FileUtils.clean_path(local_file_name)
Update Msf::Post::File.file_local_write to use Rex::FileUtils.clean_path(local_file_name).
This might break stuff. I don't care.
+4
−3
•
2
comments
- sfdb: validate search() search criteria
- requirements: Bump pyOpenSSL>=16.2.0 to pyOpenSSL>=17.5.0
- sfscan: set all attributes and functions to private
- Travis CI: Output five slowest tests (--durations=5)
- sfwebui: Add status badge class for scans with CREATED status
- sfp_template: fix syntax error and small updates
- sflib: SpiderFootEvent: Use attributes and setters
- Add sfp_api_recon_dev module
- tests: Update test_spiderfootdb
- sfdb: Use Python f-strings
- sfdb: Use Python f-strings
- sflib: Add docstrings and remove unused comments
- sfdb: Fix event validation
- sfdb: Check sfEvent.eventType not sfEvent.type
- sfdb: Check sfEvent.generated is float not str
- sfdb: Add event attribute validation and error handling
- sfwebui: Use request Accept header for response content type
- sfweui: Use consistent formatting for data type column
- sfcli: Cast dict value as string
- sfwebui: Check if status is ERROR-FAILED rather than FAILED
- sfwebui: Add code comments and fix style
- sfp_emailrep: Add support for API key
- test: Update test_spiderfootcli
- sfcli: initialize col variable
- sfp_hybrid_analysis: Add sfp_hybrid_analysis module
- Some pull requests not shown.
- New Module LXC local privilege escalation
- Add module for CVE-2020-9801, CVE-2020-9850 and CVE-2020-9856, RCE for Safari on macOS 10.15.3 (pwn2own2020)
- TeamViewer URI SMB exploit (CVE-2020-13699)
- Add CVE-2020-16205 exploit for Geutebruck G-CAM
- Add exploit for Rockwell FactoryTalk View SE (Pwn2Own Miami 2020)
- Add module for CVE-2020-9934
- ie4 mk dos (CVE-1999-0331)
Created an issue in rapid7/metasploit-framework that received 6 comments
auxiliary/gather/enum_dns ENUM_AXFR - Auxiliary failed: Errno::ECONNRESET Connection reset by peer - recvfrom(2)
See #13952 for context.
msf6 auxiliary(gather/enum_dns) > set domain github.com
domain => github.com
msf6 auxiliary(gather/enum_dns) > run [!] dns …
6
comments
- TODO: sflib.py: parseRobotsTxt: We don't check the User-Agent rule yet.. probably should at some stage
- TODO: sfdb.py: Review event attribute validation and error handling
- TODO: sfdb.py: Do something smarter to handle database locks
- TODO: sfdb.py: Raise errors upon invalid args
- TODO: sflib.py: fix whitespace parsing; ie, " " is not a valid disallowed path
- TODO: sflib.py: Move all module state to use this, which then would enable a scan to be paused/resumed.
- TODO: sfscan.py: Eventually change this to be able to control multiple scan instances
- TODO: modules/sfp__stor_stdout.py: Is it ok to not find the keys here?