This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
""" | |
Script was migrated below for better evolution and consistency: | |
https://github.com/righettod/toolbox-pentest-web/blob/master/scripts/generate-report-retirejs.py | |
""" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import UIKit | |
//Inspired from the code below: | |
//https://github.com/takashings/ScreenCapturedSample/blob/master/ScreenCapturedSample/ForScreenCapturedViewController.swift | |
//https://www.hackingwithswift.com/example-code/uikit/how-to-detect-when-the-user-takes-a-screenshot | |
@UIApplicationMain | |
class AppDelegate: UIResponder, UIApplicationDelegate { | |
func application(_ application: UIApplication, didFinishLaunchingWithOptions launchOptions: [UIApplication.LaunchOptionsKey: Any]?) -> Bool { | |
//Define a listener to handle the case when a screen recording is launched |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import json | |
import binascii | |
import hashlib | |
import argparse | |
from tabulate import tabulate | |
""" | |
Python3 script to find common entries in 2 export of a iOS device keychain performed via objection. | |
The objective is to help performing the following test of the OWASP MSTG: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
/** | |
* Function to validate that a ZIP file do not contains "ZIP SLIP" payload entries. | |
* @param string $zipFilePath Path to the ZIP to test. | |
* @return bool TRUE only if the archive do not contains ZIP SLIP payload entries. | |
* @link https://snyk.io/research/zip-slip-vulnerability | |
* @link https://stackoverflow.com/a/3599093/451455 (inspired from) | |
*/ | |
function isZipValid($zipFilePath){ | |
$isValid = false; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
""" | |
Script was migrated below for better evolution and consistency: | |
https://github.com/righettod/toolbox-pentest-web/blob/master/scripts/generate-report-odc.py | |
""" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import uuid | |
import binascii | |
from datetime import datetime | |
""" | |
Python3 script trying to reproduce the "Sandwich Attack: A New Way Of Brute Forcing UUIDs" | |
described on "https://versprite.com/blog/universally-unique-identifiers/". | |
""" | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Security authorization test suites | |
# HOME: https://github.com/ovh/venom | |
# TEST API: https://gorest.co.in/ | |
vars: | |
target_host: "" | |
testcases: | |
- name: GetUserFromCollection | |
steps: | |
- type: http | |
method: GET |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?php | |
//Local command to run example: "php -S localhost:8000" | |
//Get optional action: login / logout / random | |
$action="NA"; | |
if (isset($_GET["a"])) { | |
$action=$_GET["a"]; | |
} | |
switch ($action) { | |
//Login action fill session and local storage dummy data | |
case "login": |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: HTTP security response headers test suites | |
# TOOLS | |
# VENOM HOME: https://github.com/ovh/venom | |
# VENOM RELEASE: https://github.com/ovh/venom/releases | |
# VENOM ASSERTION KEYWORDS: https://github.com/ovh/venom#assertion | |
# REF AND RUN | |
# REF BASE: https://owasp.org/www-project-secure-headers/ | |
# RUN CMD: venom run --var="target_site=https://righettod.eu" venom_security_headers_tests_suite.yml | |
# venom run --var="target_site=https://righettod.eu" --var="internet_facing=true" venom_security_headers_tests_suite.yml | |
# venom run --var="target_site=https://righettod.eu" --var="internet_facing=true" --var="logout_url=/logout" venom_security_headers_tests_suite.yml |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
package eu.righettod; | |
import java.net.URI; | |
import java.net.http.HttpClient; | |
import java.net.http.HttpRequest; | |
import java.net.http.HttpResponse; | |
import java.time.Duration; | |
import java.util.Arrays; | |
import java.util.Locale; | |
import java.util.Optional; |