Skip to content

Instantly share code, notes, and snippets.

View evilH2O2's full-sized avatar
🏠
居家办公

荼雨 evilH2O2

🏠
居家办公
  • CN
View GitHub Profile
@evilH2O2
evilH2O2 / A工具.yaml
Last active March 12, 2021 17:19
Git-Stars
- PadBuster:
- Padding Oracle attacks 自动化脚本
- https://github.com/AonCyberLabs/PadBuster
- perl
- bettercap:
- 一个非常强大、灵活可移植的中间人攻击框架,它具有跨平台、轻量级以及模块化等优点,在渗透测试过程中能够非常好的进行中间人测试
- https://github.com/bettercap/bettercap
- go
@evilH2O2
evilH2O2 / gnome-terminal-profiles.adoc
Created January 16, 2020 14:32
Export / Import Gnome Terminal Profiles

Export Gnome Terminal Profile

List profiles

dconf dump /org/gnome/terminal/legacy/profiles:/

Determine the terminal profile string for the profile you will need. This is the terminal profile that I will export:

@evilH2O2
evilH2O2 / .Xresources
Last active April 10, 2024 09:38
[ArchLinux+I3wm] #config
! ------ ~/.Xresources -----
! 刷新配置: xrdb -merge ~/.Xresources
!
! ----- font ---
Xft.dpi:96
URxvt.font: xft:Inconsolata Nerd:size=11, xft:DejaVuSansMono Nerd:size=11, xft:Source Code Pro:size:9, xft:WenQuanYi Micro Hei:size=10
! DejaVuSansMono Nerd 和 Inconsolata Nerd 配合 Vim 插件 file icon
!URxvt.font: xft:Fira Code:size=10, xft:WenQuanYi Micro Hei:size=10
!字体间距
! URxvt.letterSpace: 1
@evilH2O2
evilH2O2 / _vimrc
Last active March 27, 2019 15:13
[Config] #config
" Windows 下 Vim设置,插件管理器:vim-plug
syntax on
set nu
set tabstop=4 "用于设置Tab键宽度,默认为 8
set shiftwidth=4
colorscheme basepurple
set cul "浅色高亮当前行
set history=1000
set autoread " 当文件在外部被修改,自动更新该文件
@evilH2O2
evilH2O2 / list.json
Last active March 5, 2019 13:54
[Bookmark] #bookmark
{
"SSRF": {
"SSRF漏洞简介": "https://mntn0x.github.io/2018/08/11/SSRF%E6%BC%8F%E6%B4%9E%E7%AE%80%E4%BB%8B/",
"SSRF漏洞的挖掘经验": "https://sobug.com/article/detail/11",
"SSRF漏洞的利用与学习": "https://uknowsec.cn/posts/notes/SSRF%E6%BC%8F%E6%B4%9E%E7%9A%84%E5%88%A9%E7%94%A8%E4%B8%8E%E5%AD%A6%E4%B9%A0.html",
"[安全科普]SSRF攻击实例解析": "https://www.freebuf.com/articles/web/20407.html",
"SSRF攻击[译文]": "https://evilwing.me/2018/07/01/ssrf%E6%94%BB%E5%87%BB-%E8%AF%91%E6%96%87/#more",
"从入门到精通: SSRF(1)": "http://www.mottoin.com/article/web/86312.html",
"Server Side Request Forgery (SSRF)": "http://twoday.cc/web%E5%AE%89%E5%85%A8/2019/01/21/Server-Side-Request-Forgery-(SSRF).html",
"SSRF分析与利用": "https://airboi.github.io/2018/05/18/SSRF%E5%88%86%E6%9E%90%E4%B8%8E%E5%88%A9%E7%94%A8/",