Skip to content

Instantly share code, notes, and snippets.

View jonaslejon's full-sized avatar
:octocat:
Working from home

Jonas Lejon jonaslejon

:octocat:
Working from home
View GitHub Profile
@jonaslejon
jonaslejon / burp_log_parser.py
Last active October 24, 2024 13:53
Burp Suite CSV Log Parser
#!/usr/bin/env python3
"""
Burp Suite CSV Log Parser
This script parses a Burp Suite CSV log file, decodes base64-encoded HTTP requests and responses,
and prints them in a human-readable format with colored output for better readability.
Usage:
python burp_log_parser.py <input_file> --status_code <status_code> --filter_response <filter_response> --negative_filter_response <negative_filter_response> --response_only --json_output
@jonaslejon
jonaslejon / esni-check.py
Created October 18, 2024 17:11
Check Encrypted SNI statistics by reading Zeek logs
import os
import gzip
import orjson
import argparse
from colorama import init, Fore, Style
# Initialize colorama for cross-platform color support
init(autoreset=True)
# Initialize counters for statistics
@jonaslejon
jonaslejon / postnord.txt
Created March 7, 2022 18:11
.com domains starting with postnord
$ zgrep ^postnord 2022-02-07-com.zone.gz|awk '{print $1}'|sort -u
postnord-22.com.
postnord-delivery.com.
postnord-dk-post.com.
postnord-dk.com.
postnord-epostal.com.
postnord-logistics.com.
postnord-nestle.com.
postnord-no.com.
postnord-norway.com.
@jonaslejon
jonaslejon / wpsec.php
Created February 24, 2022 18:31
WPSec.com PHP API
<?php
// Fetches a temporary access_token Bearer
// Replace the client_secret and client_id below
$curl = curl_init();
curl_setopt_array($curl, array(
CURLOPT_URL => 'https://api.wpsec.com/oauth/token',
CURLOPT_RETURNTRANSFER => true,
CURLOPT_ENCODING => '',
@jonaslejon
jonaslejon / find.sh
Created November 3, 2021 07:14
Find Trojan Source unicode characters (CVE-2021-42694 and CVE-2021-42574.)
#/bin/sh
# Usage instructions: sh find.sh php|tr '\n' '; '
# Then copy and paste the output and execute it
ext=$1
C="\u200E \u200F \u202A \u202B \u202C \u202D \u202E \u2066 \u2067 \u2068 \u2069 \u202C"
for a in $C; do echo find . -type f -name \"*.$ext\" -exec grep -H \$\'$a\' {} \\\; ; done
@jonaslejon
jonaslejon / wp-config-sample.php
Created March 24, 2020 08:02
WordPress with Phpsploit backdoor
<?php
/**
* The base configuration for WordPress
*
* The wp-config.php creation script uses this file during the
* installation. You don't have to use the web site, you can
* copy this file to "wp-config.php" and fill in the values.
*
* This file contains the following configurations:
*
@jonaslejon
jonaslejon / custom.list.chroot
Last active February 21, 2023 14:13
My custom Kali Linux package list for building the live ISO
python-usb
python3-usb
mingw-w64
isc-dhcp-server
bridge-utils
libdbus-1-dev
libdbus-glib-1-dev
python3-venv
dirbuster
cmake
@jonaslejon
jonaslejon / xenxxe.py
Last active September 9, 2021 06:07
Citrix XenMobile XXE Exploit
#!/usr/bin/python3
##
## PoC test for the XXE security vulnerability CVE-2018-10653 in XenMobile Server 10.8 before RP2 and 10.7 before RP3
##
## This PoC was written by Jonas Lejon 2019-11-28 <[email protected]> https://triop.se
## Reported to Citrix 2017-10, patch released 2018-05
##
import requests
import sys
-----BEGIN PGP PUBLIC KEY BLOCK-----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@jonaslejon
jonaslejon / dns-resolvers.txt
Last active June 25, 2018 19:52
DNS Resolvers with tcpdump output
## Resolver 1 Bahnhof
21:25:35.771950 IP 212.85.75.170.19496 > 79.99.X.X.53: 49195% [1au] A? sfsdsdf.msg.triop.se. (49)
21:25:36.153508 IP 212.85.75.170.55716 > 79.99.X.X.53: 26680% [1au] A? sfsdsdf.msg.triop.se. (49)
21:25:36.527427 IP 212.85.75.170.54433 > 79.99.X.X.53: 59891% [1au] A? sfsdsdf.msg.triop.se. (49)
21:25:37.279054 IP 212.85.75.170.21402 > 79.99.X.X.53: 44218% [1au] A? sfsdsdf.msg.triop.se. (49)
21:25:38.039318 IP 212.85.75.170.40338 > 79.99.X.X.53: 12866% [1au] A? sfsdsdf.msg.triop.se. (49)
21:25:38.771474 IP 212.85.75.170.25648 > 79.99.X.X.53: 42286% [1au] A? sfsdsdf.msg.triop.se. (49)
21:25:39.540317 IP 212.85.75.170.10337 > 79.99.X.X.53: 17760% [1au] A? sfsdsdf.msg.triop.se. (49)
21:25:40.276141 IP 212.85.75.170.57853 > 79.99.X.X.53: 29710% [1au] A? sfsdsdf.msg.triop.se. (49)