~ ~ Burp ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ .*.domain.com
~~ Vuln Servers ~~ http://testphp.vulnweb.comaa
Fdisk I list my drives in the computer sudo fdisk -l 2> /dev/null | egrep 'Disk /dev/'
http://testphp.vulnweb.com/listproducts.php\?cat\=123\&artist\=123\&asdf\=ff
~~ Mount NTFS on macos~~ brew install ntfs-3g && brew install --cask macfuse && diskutil list You need to run the following commands each time that you want to mount a drive with write permissions. Replace /dev/disk1s1 with the drive address that you found above: sudo mkdir /Volumes/NTFS Then: sudo /usr/local/bin/ntfs-3g /dev/disk1s1 /Volumes/NTFS -o local -o allow_other -o auto_xattr -o auto_cache
~~ Bash Scriptinng ~~ basename /path/to/file -> file
~~ Inscope ~~ cat testinput | inscope cat .scope
╰─❯ alias rtc='which awk perl python python3 python3 ruby lua gcc cc vi vim nmap find netcat nc wget tftp ftp 2>/dev/null' ─╯
~~ IOS & Burp ~~ If you are having issues intercepting traffic on iOS13 with Burp Suite, try disabling TLSv1.3. You can do that by either one of these methods: https://twitter.com/_Dark_Knight_/status/1296485808812302336 | https://getpocket.com/read/3142039191 -Djdk.tls.server.protocols=TLSv1,TLSv1.1,TLSv1.2 OR -- objection --killswitch2 v0.14 -- iOS 13.4.1
~~ Get Contributors git log --branches --not --remotes=subrepo --use-mailmap --format="%aN <%aE>" | awk "{arr[$0]++} END{for (i in arr){print arr[i], i;}}" | sort -rn | cut -d" " -f2- | sort
~ ~ URLs / Parsing ~ ~
cat "domain.name" | filter-resolved
~~ DnsResolver sort -R resolvers.txt | taol -n 25 > 25resolvers.txt
~~ Convert Iage to DDF brew install imagemagick convert image.png output.pdf
~ ~ Http ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
httpbin.org
wget -q -O - archive.kali.org/archive-key.asc | sudo apt-key add - Install Kali packages on Ubuntu
ssh -T [email protected]
ssh-copy-id user@ip
wget -r --no-parent -R "index.html*" https://wordlists-cdn.assetnote.io/data/ -nH
~ ~ Vim ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ %!sort -u --version-sort ZZ exits Vim. Found from here
~ ~ Vi ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
TARGETFILE=$1
# Insert 2 lines in file, then save.
#--------Begin here document-----------#
vi $TARGETFILE <<x23LimitStringx23
i
This is line 1 of the example file.
This is line 2 of the example file.
^[
ZZ
x23LimitStringx23
#----------End here document-----------#
# Note that ^[ above is a literal escape
#+ typed by Control-V <Esc>.
# Bram Moolenaar points out that this may not work with 'vim'
#+ because of possible problems with terminal interaction.
exit
~ ~ OS ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
certutil -hashfile C:/Users/user1/Downloads/software.zip SHA256 certutil -hashfile C:/Users/user1/Downloads/software.zip MD5
~ ~ URLs ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ https://www.virustotal.com/gui/domain/target.com/details
https://www.easycalculation.com/
~ ~ Windows ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
Safety Net Scanner https://docs.microsoft.com/en-us/windows/security/threat-protection/intelligence/safety-scanner-download
Farbar Recovery Scan Tool (FRST) bleepingcomputer.com/download/farbar-recovery-scan-tool/