Skip to content

JLDevOps/ORLFTExploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

O'Reilly Learning's Free Trial Exploit

This exploit targets O'Reilly Learning's Free Trial registration by registering the sign-up form with a fake account that you can then use access their (content)[https://learning.oreilly.com/home/]

This code is referenced and written about in my Medium post.

Getting Started

These instructions will get you a copy of the project up and running on your local machine.

Prerequisites

You will need to have Python 3.x and PIP installed on your machine.

Installations

The following steps go through installing Python dependencies and setting up the environment for the tool.

  1. Install the Python modules for this tool
    $ pip install -r requirements.txt
    

Usage

Using the ORLFT Exploit via Terminal/Command Line

You can also run the orlft_exploit.py file by itself, and provide arguments to what functionality you would like to use.

    $ python orlft_exploit.py

Below are some optional arguments you can use to override the identity parameters:

  1. -fn (First Name)
  2. -ln (Last Name)
  3. -e (Email)
  4. -p (Password)

Sample command to use input a first name that you choose:

    $ python orlft_exploit.py -fn  {First name}

Built With

  • Python 3.6

Authors

License

Licensed under the Apache License 2.0

About

Exploit script to constantly get free access to O'Reilly Learning material via their Free Trial Page - https://learning.oreilly.com/register/

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages