Bootstrap < 3.4.1 || < 4.3.1
✔️ CSP strict-dynamic bypass
➖ Requires user interaction
➖ Requires $('[data-toggle="tooltip"]').tooltip();
| import requests | |
| import json | |
| from requests.packages.urllib3.exceptions import InsecureRequestWarning | |
| requests.packages.urllib3.disable_warnings(InsecureRequestWarning) | |
| session = requests.Session() | |
| http_proxy = "http://192.168.1.130:8085" | |
| proxyDict = { | |
| "http" : http_proxy, | |
| "https" : http_proxy, |
| // How many ways can you alert(document.domain)? | |
| // Comment with more ways and I'll add them :) | |
| // I already know about the JSFuck way, but it's too long to add (: | |
| // Direct invocation | |
| alert(document.domain); | |
| (alert)(document.domain); | |
| al\u0065rt(document.domain); | |
| al\u{65}rt(document.domain); | |
| window['alert'](document.domain); |
| java_import 'burp.IBurpExtender' | |
| java_import 'burp.IScannerCheck' | |
| java_import 'burp.IScanIssue' | |
| require 'java' | |
| java_import 'java.util.Arrays' | |
| java_import 'java.util.ArrayList' | |
| # | |
| # You will need to download JRuby's Complete.jar file from http://jruby.org/download and configure Burp Extender with its path. |
| import requests | |
| import sys | |
| import json | |
| def waybackurls(host, with_subs): | |
| if with_subs: | |
| url = 'http://web.archive.org/cdx/search/cdx?url=*.%s/*&output=json&fl=original&collapse=urlkey' % host | |
| else: | |
| url = 'http://web.archive.org/cdx/search/cdx?url=%s/*&output=json&fl=original&collapse=urlkey' % host |
The purpose of this document is to make recommendations on how to browse in a privacy and security conscious manner. This information is compiled from a number of sources, which are referenced throughout the document, as well as my own experiences with the described technologies.
I welcome contributions and comments on the information contained. Please see the How to Contribute section for information on contributing your own knowledge.
| #!/usr/bin/env python | |
| # -*- coding: iso-8859-1 -*- | |
| # -*- coding: utf-8 -*- | |
| # | |
| # Wordpress Watcher | |
| # Automating WPscan to scan and report vulnerable Wordpress sites | |
| # Florian Roth | |
| # v0.1 | |
| # March 2015 | |
| # |
| #!/usr/bin/env python2 | |
| """ | |
| Author: takeshix <[email protected]> | |
| PoC code for CVE-2014-0160. Original PoC by Jared Stafford ([email protected]). | |
| Supportes all versions of TLS and has STARTTLS support for SMTP,POP3,IMAP,FTP and XMPP. | |
| """ | |
| import sys,struct,socket | |
| from argparse import ArgumentParser |