پنل تحت وب مدیریت V2ray و ساخت کاربر و مدیریت سرور
mkdir x-ui && cd x-ui
docker run -itd --network=host \
-v $PWD/db/:/etc/x-ui/ \
-v $PWD/cert/:/root/cert/ \
| #!/usr/bin/env bash | |
| [[ $(id -u) != 0 ]] && exit 1 | |
| TUN2SOCKS=tun2socks | |
| INIT=xray.client | |
| DEFAULTS=() | |
| INTERFACE=usb0 | |
| trap "cleanup" EXIT |
| cat << EOF > /usr/local/etc/v2ray/config.json | |
| { | |
| "log": { | |
| "loglevel": "warning" | |
| }, | |
| "policy": { | |
| "levels": { | |
| "0": { | |
| "handshake": 5, | |
| "connIdle": 300, |
| // Copy paste this line in your browser console to run the script and get the result | |
| fetch('https://gist.githubusercontent.com/SamadiPour/a18b1e186deac76c4a95fa108d02a6ea/raw/snappfood_enhanced.js').then(r => r.text()).then(code => eval(code)); |
| import socket | |
| import threading | |
| import select | |
| SOCKS_VERSION = 5 | |
| class Proxy: |
| import socket | |
| import select | |
| import time | |
| import sys | |
| # Changing the buffer_size and delay, you can improve the speed and bandwidth. | |
| # But when buffer get to high or delay go too down, you can broke things | |
| buffer_size = 4096 | |
| delay = 0.0001 | |
| forward_to = ('ncbi.nlm.nih.gov', 80) |
| import pandas as pd | |
| def rsi(ohlc: pd.DataFrame, period: int = 14) -> pd.Series: | |
| """See source https://github.com/peerchemist/finta | |
| and fix https://www.tradingview.com/wiki/Talk:Relative_Strength_Index_(RSI) | |
| Relative Strength Index (RSI) is a momentum oscillator that measures the speed and change of price movements. | |
| RSI oscillates between zero and 100. Traditionally, and according to Wilder, RSI is considered overbought when above 70 and oversold when below 30. | |
| Signals can also be generated by looking for divergences, failure swings and centerline crossovers. |
| X-Forwarded-Host | |
| X-Forwarded-Port | |
| X-Forwarded-Scheme | |
| Origin: null | |
| Origin: [siteDomain].attacker.com | |
| X-Frame-Options: Allow | |
| X-Forwarded-For: 127.0.0.1 | |
| X-Client-IP: 127.0.0.1 | |
| Client-IP: 127.0.0.1 | |
| ---For injecting BXSS(blind XSS) || SQLI payloads--- |
| #!/usr/bin/python | |
| import socket | |
| import struct | |
| # creating a rawSocket for communications | |
| # PF_SOCKET (packet interface), SOCK_RAW (Raw socket) - htons (protocol) 0x08000 = IP Protocol | |
| rawSocket = socket.socket(socket.PF_PACKET, socket.SOCK_RAW, socket.htons(0x0800)) | |
| # deciding interface - packet sniffing and then injection |
| # -*- coding: UTF-8 -*- | |
| # All credits go to: https://github.com/joren485/PyWinPrivEsc/blob/master/RunAsSystem.py | |
| from ctypes.wintypes import * | |
| from ctypes import * | |
| from enum import IntEnum | |
| # These libraries have the APIs we need | |
| kernel32 = WinDLL('kernel32', use_last_error=True) | |
| advapi32 = WinDLL('advapi32', use_last_error=True) | |
| psapi = WinDLL('psapi.dll', use_last_error=True) |