This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
''' | |
# Exploit Title: LibreNMS v1.46 authenticated Remote Code Execution | |
# Date: 24/12/2018 | |
# Exploit Author: Askar (@mohammadaskar2) | |
# CVE : CVE-2018-20434 | |
# Vendor Homepage: https://www.librenms.org/ | |
# Version: v1.46 | |
# Tested on: Ubuntu 18.04 / PHP 7.2.10 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# gcloud auth activate-service-account --key-file=85.json | |
# gcloud projects list | |
project="my-project" | |
space="" | |
echo "gcloud auth list" | |
gcloud auth list | |
echo -e "$space" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# If you find a site with /_wpeprivate/config.json file exposed, run this and get all kinds of fun goodies. | |
# If it "no worked" (Technical Term) then you probably need to install jq! | |
TARGET=$1 | |
TARGETDOMAIN=$(echo $TARGET | cut -d/ -f3) | |
# Pretty Colors | |
RESET='\033[00m' | |
GREEN='\033[01;32m' |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* | |
Developer: Marzavec ( https://github.com/marzavec ) | |
Description: A simple browser-based subdomain bruteforcing script, using DoH providers. Developed as a 5 minute hack, just to see it's preformance. Many improvements could be made, such as adding error handling or informing the user when the script is done. | |
Usage: Open the browsers dev console (usually F12), paste this script, change the `rootTld`, press enter to run. Ezpz. | |
*/ | |
const rootTld = 'lyka.pro'; // change to your target's root tld | |
// url to newline seperated wordlist | |
const wordlistUrl = 'https://raw.githubusercontent.com/rbsec/dnscan/master/subdomains.txt'; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
curl -s "https://urlscan.io/api/v1/search/?q=domain:$1" | grep -E '"url"' | cut -d '"' -f4 | grep -F $1 | sort -u |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
""" | |
Python script to enumerate valid Microsoft 365 domains, retrieve tenant name, and check for an MDI instance. | |
Based on: https://github.com/thalpius/Microsoft-Defender-for-Identity-Check-Instance. | |
Usage: ./check_mdi.py -d <domain> | |
""" | |
import argparse | |
import dns.resolver |
OlderNewer