Skip to content

Instantly share code, notes, and snippets.

View cydefenser's full-sized avatar

Ajay Kulal cydefenser

View GitHub Profile
"""..."""
from requests import get
from requests.exceptions import ConnectionError
from netaddr import IPNetwork
from pprint import pprint
CONFIG = {
"HOST": "192.168.1.0/24",
"SCHEME": "http",
"CONNECT_TIMEOUT": 3,
@milo2012
milo2012 / portList-exploits.csv
Created December 30, 2016 05:33
portList-exploits.csv
0 exploits/windows/dcerpc/ms07_029_msdns_zonename []
10000 exploits/unix/webapp/webmin_show_cgi_exec []
10000 exploits/windows/backupexec/remote_agent []
10000 exploits/windows/oracle/osb_ndmp_auth []
10001 exploits/multi/misc/zend_java_bridge []
10008 exploits/windows/misc/gimp_script_fu []
1000 exploits/windows/http/altn_webadmin []
10050 exploits/unix/misc/zabbix_agent_exec []
10051 exploits/linux/misc/zabbix_server_exec []
10080 exploits/linux/antivirus/escan_password_exec []
@Plazmaz
Plazmaz / bug-bounty-list.txt
Created February 1, 2017 17:56
A list of bug bounty urls
http://www.123contactform.com/
http://99designs.com/
https://www.abacus.com/
https://www.acquia.com/
http://www.activecampaign.com/
http://activeprospect.com/
http://www.adobe.com/
https://www.aerofs.com/
https://www.airbnb.com/
http://en.altervista.org/
@cre8tions
cre8tions / dahua-backdoor.py
Created April 5, 2017 18:29
dahua exploit poc
#!/usr/bin/python2.7
#
# Dahua backdoor Generation 2 and 3
# Author: bashis <mcw noemail eu> March 2017
#
# Credentials: No credentials needed (Anonymous)
#Jacked from git history
#
import string
import requests
import sys
import json
def waybackurls(host, with_subs):
if with_subs:
url = 'http://web.archive.org/cdx/search/cdx?url=*.%s/*&output=json&fl=original&collapse=urlkey' % host
else:
url = 'http://web.archive.org/cdx/search/cdx?url=%s/*&output=json&fl=original&collapse=urlkey' % host
@jhaddix
jhaddix / all.txt
Last active October 23, 2025 03:43
all wordlists from every dns enumeration tool... ever. Please excuse the lewd entries =/
This file has been truncated, but you can view the full file.
.
..
........
@
*
*.*
*.*.*
🐎
/http://example.com
/%5cexample.com
/%2f%2fexample.com
/example.com/%2f%2e%2e
/http:/example.com
/?url=http://example.com&next=http://example.com&redirect=http://example.com&redir=http://example.com&rurl=http://example.com
/?url=//example.com&next=//example.com&redirect=//example.com&redir=//example.com&rurl=//example.com
/?url=/\/example.com&next=/\/example.com&redirect=/\/example.com
/redirect?url=http://example.com&next=http://example.com&redirect=http://example.com&redir=http://example.com&rurl=http://example.com
/redirect?url=//example.com&next=//example.com&redirect=//example.com&redir=//example.com&rurl=//example.com
@Fitblip
Fitblip / certstalgia.sh
Created November 5, 2017 00:06
Certstream Logstalgia Output v2
certstream --json | \
jq -r '.data | [ (.seen|floor|tostring), (.leaf_cert.all_domains[0]|split(".")|.[-1]), .chain[0].subject.CN, "200", "0" ] | join("|")' | \
logstalgia -g "Certificate Authorities,CODE=^200,0" --hide-response-code --hide-paddle --path-abbr-depth -1 --no-bounce -s 2 --address-abbr-depth -1
@niklasb
niklasb / railspwn.rb
Last active March 7, 2021 12:14
Rails 5.1.4 YAML unsafe deserialization RCE payload
require 'yaml'
require 'base64'
require 'erb'
class ActiveSupport
class Deprecation
def initialize()
@silenced = true
end
class DeprecatedInstanceVariableProxy
@orangetw
orangetw / Advanced-HTTP-en.md
Created November 19, 2017 19:52 — forked from nicolas-grekas/Advanced-HTTP-en.md
Advanced handling of HTTP requests in PHP