Skip to content

Instantly share code, notes, and snippets.

View 0x3n0's full-sized avatar
🎯
Focusing

Eno Leriand 0x3n0

🎯
Focusing
View GitHub Profile
package main

import (
  "encoding/json"
  "flag"
  "fmt"
  "io/ioutil"
  "net/http"
  "os"
@0x3n0
0x3n0 / dom.md
Last active April 16, 2025 06:38
(function () {
  const suspiciousSources = [
    'location',
    'location.href',
    'location.search',
    'document.URL',
    'document.documentURI',
    'document.referrer'
  ];
(async function () {
    const delay = ms => new Promise(resolve => setTimeout(resolve, ms));
    const clickMuteButton = async () => {
        const replies = document.querySelectorAll('[data-testid="tweet"]');
        for (const reply of replies) {
            const blueCheck = reply.querySelector('svg[aria-label="Verified account"]');
            if (blueCheck) {
                const moreOptionsButton = reply.querySelector('[aria-label="More"]');
                if (moreOptionsButton) {
https://bestfiends-api-dsa.playtika.com
https://banners.playtika.com
https://bf-prod-cdn.playtika.com
https://bingo-app-dsa.playtika.com
https://bingo-ce-bb.playtika.com
https://bk-cdn.playtika.com
https://bk-preprod-static.playtika.com
https://cc-fb-cdn.playtika.com
https://cc-php-dsa.playtika.com
https://octopus-preprod.playtika.com

Website Crawler for Clickjacking Detection Using X-Frame-Options and CSP

This script is a Go-based website crawler designed to detect potential vulnerabilities to clickjacking attacks. It works by examining HTTP headers such as X-Frame-Options and Content-Security-Policy.

Features:

  • Crawling Capability: Recursively scans all reachable URLs within the same domain starting from the base URL.
  • Header Analysis:
    • Detects the presence and values of the X-Frame-Options header.
    • Parses Content-Security-Policy directives for frame-ancestors to evaluate iframe embedding restrictions.
  • Vulnerability Classification:
    • Protected: URLs with sufficient protections (X-Frame-Options or CSP frame-ancestors).
const startDate = new Date('2022-01-01');
const endDate = new Date('2023-01-01');
const waitForElemToExist = async (selector, timeout = 5000) => {
return new Promise((resolve) => {
const element = document.querySelector(selector);
if (element) return resolve(element);
const observer = new MutationObserver(() => {
const element = document.querySelector(selector);
@0x3n0
0x3n0 / Penetration Testing Report.md
Last active August 18, 2024 10:12
This Gist contains a detailed penetration testing report for the system with IP address 192.168.8.4. The report outlines the scope of the test, methodologies used, key findings, vulnerabilities discovered, and actionable recommendations to enhance the security of the target system. Prepared by Eno Leriand on August 13, 2024.

Penetration Testing Report for Target System 192.168.8.4 - August 2024

Date: August 13, 2024
Pentester: Eno Leriand


Table of Contents

  1. Report Overview
#!/bin/bash

# Variables
HOSTAPD_CONF="/tmp/evil_twin/hostapd.conf"
DNSMASQ_CONF="/tmp/evil_twin/dnsmasq.conf"
PHISHING_PAGE_DIR="/tmp/evil_twin/www"
PHISHING_PAGE="$PHISHING_PAGE_DIR/index.html"
CAPTURE_FILE="/tmp/evil_twin/capture.txt"
HOTSPOT_IP="192.168.20.1"
@0x3n0
0x3n0 / battry
Last active December 27, 2023 13:48
#!/bin/bash
battery_status=$(acpi | awk '{print $3}')
battery_percentage=$(acpi | awk '{print $4}' | sed 's/,//')
if [ "$battery_status" == "Discharging," ]; then
icon="πŸ”‹"
else
icon="πŸ”Œ"
set -g mouse on

# unbind default prefix and set it to ctrl-a
unbind C-b
set -g prefix C-a
bind C-a send-prefix

# make delay shorter
set -sg escape-time 0