This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| ######################################################################################################### | |
| # Script to identify Log4J affected class for CVE-2021-44228 in a collection of EAR/WAR/JAR files | |
| # Based on this script: | |
| # https://github.com/righettod/toolbox-pentest-web/blob/master/scripts/identify-class-location.sh | |
| ######################################################################################################### | |
| if [ "$#" -lt 1 ]; then | |
| script_name=$(basename "$0") | |
| echo "Usage:" | |
| echo " $script_name [BASE_SEARCH_FOLDER]" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| ######################################################################################################### | |
| # Script to identify Log4J affected class for CVE-2021-44228 in a collection of jar files | |
| # Based on this script: | |
| # https://github.com/righettod/toolbox-pentest-web/blob/master/scripts/identify-class-location.sh | |
| ######################################################################################################### | |
| if [ "$#" -lt 1 ]; then | |
| script_name=$(basename "$0") | |
| echo "Usage:" | |
| echo " $script_name [APP_LIBS_FOLDER]" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| """ | |
| Script was migrated below for better evolution and consistency: | |
| https://github.com/righettod/toolbox-pentest-web/blob/master/scripts/generate-report-npm.py | |
| """ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| package eu.righettod; | |
| import java.net.URI; | |
| import java.net.http.HttpClient; | |
| import java.net.http.HttpRequest; | |
| import java.net.http.HttpResponse; | |
| import java.time.Duration; | |
| import java.util.Arrays; | |
| import java.util.Locale; | |
| import java.util.Optional; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| name: HTTP security response headers test suites | |
| # TOOLS | |
| # VENOM HOME: https://github.com/ovh/venom | |
| # VENOM RELEASE: https://github.com/ovh/venom/releases | |
| # VENOM ASSERTION KEYWORDS: https://github.com/ovh/venom#assertion | |
| # REF AND RUN | |
| # REF BASE: https://owasp.org/www-project-secure-headers/ | |
| # RUN CMD: venom run --var="target_site=https://righettod.eu" venom_security_headers_tests_suite.yml | |
| # venom run --var="target_site=https://righettod.eu" --var="internet_facing=true" venom_security_headers_tests_suite.yml | |
| # venom run --var="target_site=https://righettod.eu" --var="internet_facing=true" --var="logout_url=/logout" venom_security_headers_tests_suite.yml |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <?php | |
| //Local command to run example: "php -S localhost:8000" | |
| //Get optional action: login / logout / random | |
| $action="NA"; | |
| if (isset($_GET["a"])) { | |
| $action=$_GET["a"]; | |
| } | |
| switch ($action) { | |
| //Login action fill session and local storage dummy data | |
| case "login": |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| name: Security authorization test suites | |
| # HOME: https://github.com/ovh/venom | |
| # TEST API: https://gorest.co.in/ | |
| vars: | |
| target_host: "" | |
| testcases: | |
| - name: GetUserFromCollection | |
| steps: | |
| - type: http | |
| method: GET |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import uuid | |
| import binascii | |
| from datetime import datetime | |
| """ | |
| Python3 script trying to reproduce the "Sandwich Attack: A New Way Of Brute Forcing UUIDs" | |
| described on "https://versprite.com/blog/universally-unique-identifiers/". | |
| """ | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| """ | |
| Script was migrated below for better evolution and consistency: | |
| https://github.com/righettod/toolbox-pentest-web/blob/master/scripts/generate-report-odc.py | |
| """ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <?php | |
| /** | |
| * Function to validate that a ZIP file do not contains "ZIP SLIP" payload entries. | |
| * @param string $zipFilePath Path to the ZIP to test. | |
| * @return bool TRUE only if the archive do not contains ZIP SLIP payload entries. | |
| * @link https://snyk.io/research/zip-slip-vulnerability | |
| * @link https://stackoverflow.com/a/3599093/451455 (inspired from) | |
| */ | |
| function isZipValid($zipFilePath){ | |
| $isValid = false; |