package main
import (
"encoding/json"
"flag"
"fmt"
"io/ioutil"
"net/http"
"os"
(function () {
const suspiciousSources = [
'location',
'location.href',
'location.search',
'document.URL',
'document.documentURI',
'document.referrer'
];
(async function () {
const delay = ms => new Promise(resolve => setTimeout(resolve, ms));
const clickMuteButton = async () => {
const replies = document.querySelectorAll('[data-testid="tweet"]');
for (const reply of replies) {
const blueCheck = reply.querySelector('svg[aria-label="Verified account"]');
if (blueCheck) {
const moreOptionsButton = reply.querySelector('[aria-label="More"]');
if (moreOptionsButton) {
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
https://bestfiends-api-dsa.playtika.com | |
https://banners.playtika.com | |
https://bf-prod-cdn.playtika.com | |
https://bingo-app-dsa.playtika.com | |
https://bingo-ce-bb.playtika.com | |
https://bk-cdn.playtika.com | |
https://bk-preprod-static.playtika.com | |
https://cc-fb-cdn.playtika.com | |
https://cc-php-dsa.playtika.com | |
https://octopus-preprod.playtika.com |
This script is a Go-based website crawler designed to detect potential vulnerabilities to clickjacking attacks. It works by examining HTTP headers such as X-Frame-Options
and Content-Security-Policy
.
- Crawling Capability: Recursively scans all reachable URLs within the same domain starting from the base URL.
- Header Analysis:
- Detects the presence and values of the
X-Frame-Options
header. - Parses
Content-Security-Policy
directives forframe-ancestors
to evaluate iframe embedding restrictions.
- Detects the presence and values of the
- Vulnerability Classification:
- Protected: URLs with sufficient protections (
X-Frame-Options
orCSP frame-ancestors
).
- Protected: URLs with sufficient protections (
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
const startDate = new Date('2022-01-01'); | |
const endDate = new Date('2023-01-01'); | |
const waitForElemToExist = async (selector, timeout = 5000) => { | |
return new Promise((resolve) => { | |
const element = document.querySelector(selector); | |
if (element) return resolve(element); | |
const observer = new MutationObserver(() => { | |
const element = document.querySelector(selector); |
Date: August 13, 2024
Pentester: Eno Leriand
#!/bin/bash
# Variables
HOSTAPD_CONF="/tmp/evil_twin/hostapd.conf"
DNSMASQ_CONF="/tmp/evil_twin/dnsmasq.conf"
PHISHING_PAGE_DIR="/tmp/evil_twin/www"
PHISHING_PAGE="$PHISHING_PAGE_DIR/index.html"
CAPTURE_FILE="/tmp/evil_twin/capture.txt"
HOTSPOT_IP="192.168.20.1"
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
battery_status=$(acpi | awk '{print $3}') | |
battery_percentage=$(acpi | awk '{print $4}' | sed 's/,//') | |
if [ "$battery_status" == "Discharging," ]; then | |
icon="π" | |
else | |
icon="π" |
set -g mouse on
# unbind default prefix and set it to ctrl-a
unbind C-b
set -g prefix C-a
bind C-a send-prefix
# make delay shorter
set -sg escape-time 0
NewerOlder