I hereby claim:
- I am 0xcrypto on github.
- I am 0xcrypto (https://keybase.io/0xcrypto) on keybase.
- I have a public key ASCFLpfkpOKtDDLe271f4wv8V-MdNxg139xm1qeXcoXVFAo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
def ping(ip): | |
# database change value of ip to processing here | |
if(not os.system("ping %s" % ip)): | |
# database change value of ip to up here | |
return True | |
# database change value of ip to down here | |
return False | |
{{ 7 * 7 }} |
<?php | |
echo phpinfo(); | |
exit() | |
?> |
javascript:alert((function() {links=[];document.querySelectorAll('.yuRUbf').forEach(function (e) {e.childNodes.forEach(function (f) {links.push(f.getAttribute('href'));});});return links;})().join("\n")) |
# Exploit Title: Microsoft SharePoint Server 2019 - Remote Code Execution | |
# Google Dork: inurl:quicklinks.aspx | |
# Date: 2020-08-14 | |
# Exploit Author: West Shepherd | |
# Vendor Homepage: https://www.microsoft.com | |
# Version: SharePoint Enterprise Server 2013 Service Pack 1, SharePoint Enterprise Server 2016 , SharePoint Server 2010 Service | |
# Pack 2, SharePoint Server 2019 | |
# Tested on: Windows 2016 | |
# CVE : CVE-2020-1147 | |
# Credit goes to Steven Seele and Soroush Dalili |
#!/usr/bin/env zsh | |
rm ~/bugbounty -rf | |
mkdir ~/bugbounty | |
cd ~/bugbounty | |
curl -O "https://raw.githubusercontent.com/projectdiscovery/public-bugbounty-programs/master/chaos-bugbounty-list.json" | |
cat chaos-bugbounty-list.json | grep '"name"' | awk '{$1=$1};1' | sed 's/"name": "//g' | sed 's/"name":"//g' | sed 's/",//g' | while read folder; do mkdir -p $folder -v; done | |
for (( i=0; i < $(cat chaos-bugbounty-list.json | jq -r .programs | jq length); i++ )) | |
do | |
cat chaos-bugbounty-list.json | jq --arg i "$i" -r ".programs[($i | tonumber)].domains | .[]" > "$(cat chaos-bugbounty-list.json | jq --arg i "$i" -r '.programs[($i | tonumber)].name')/assets.txt" && echo -n "." |
[ | |
{ | |
"cicd_pass": true, | |
"cname": ["us-east-1.elasticbeanstalk.com"], | |
"discussion": "[Issue #194](https://github.com/EdOverflow/can-i-take-over-xyz/issues/194)", | |
"documentation": "", | |
"fingerprint": "NXDOMAIN", | |
"nxdomain": true, | |
"service": "AWS/Elastic Beanstalk", | |
"status": "Vulnerable", |
import json, asyncio, pickle, os | |
from pathlib import Path | |
from takeover.takeover import takeover | |
home = str(Path.home()) | |
# config is an dictionary. See ~/.config/takeover/config.json for structure | |
config = json.load(open(home + "/.config/takeover/config.json")) | |
# Do not forget to replace pointer to fingerprints with the valid data. See ~/.config/takeover/fingerprints.json for structure |
{% macro errorList(errors) %} | |
{% if errors %} | |
<ul class="errors"> | |
{% for error in errors %} | |
<li>{{ error }}</li> | |
{% endfor %} | |
</ul> | |
{% endif %} | |
{% endmacro %} |