=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
BrainFuck Programming Tutorial by: Katie
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
aaa | |
aaas | |
about | |
acap | |
acct | |
acr | |
adiumxtra | |
afp | |
afs | |
aim |
#!/usr/bin/env python3 | |
""" | |
Add this script to a global directory (e.g. /usr/local/bin) in your WSL | |
without the ``.py`` extension. | |
This script will automatically open any file/directory with it's default | |
Windows Application. Directories will be opened with Windows' file | |
explorer. | |
Usage: open <(dir/file)> |
{ | |
"flags": "-HnriE", | |
"patterns": [ | |
"(xox[p|b|o|a]-[0-9]{12}-[0-9]{12}-[0-9]{12}-[a-z0-9]{32})", | |
"-----BEGIN RSA PRIVATE KEY-----", | |
"-----BEGIN DSA PRIVATE KEY-----", | |
"-----BEGIN EC PRIVATE KEY-----", | |
"-----BEGIN PGP PRIVATE KEY BLOCK-----", | |
"AKIA[0-9A-Z]{16}", | |
"amzn\\.mws\\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}", |
# Import modules that'll be needed to run this tool | |
import requests | |
from bs4 import BeautifulSoup | |
from re import search | |
from sys import stdin, exit, stdout | |
from time import sleep | |
# Hide insecure request warning error | |
from requests.packages.urllib3.exceptions import InsecureRequestWarning | |
requests.packages.urllib3.disable_warnings(InsecureRequestWarning) |
// find javascript gadgets -- | |
// forked => https://gist.github.com/nikitastupin/b3b64a9f8c0eb74ce37626860193eaec | |
// ref => https://github.com/BlackFan/client-side-prototype-pollution | |
// ref => https://portswigger.net/web-security/cross-site-scripting/cheat-sheet#prototype-pollution | |
// updated; @dualfade -- | |
// start -- | |
// check for known gadgets -- | |
(() => { | |
// gadgets -- |
#!/usr/bin/env bash | |
#: Your comments here. | |
set -o errexit | |
set -o nounset | |
set -o pipefail | |
work_dir=$(dirname "$(readlink --canonicalize-existing "${0}" 2> /dev/null)") | |
readonly conf_file="${work_dir}/script.conf" | |
readonly error_reading_conf_file=80 | |
readonly error_parsing_options=81 | |
readonly script_name="${0##*/}" |
╔╦╗╦ ╦ ╔╗ ┬ ┬┌─┐ ╔╗ ┌─┐┬ ┬┌┐┌┬┐┬ ┬ ╦═╗┌─┐┌─┐┌─┐┬ ┬┬─┐┌─┐┌─┐┌─┐ | |
║║║╚╦╝ ╠╩╗│ ││ ┬ ╠╩╗│ ││ │││││ └┬┘ ╠╦╝├┤ └─┐│ ││ │├┬┘│ ├┤ └─┐ | |
╩ ╩ ╩ ╚═╝└─┘└─┘ ╚═╝└─┘└─┘┘└┘┴ ┴ ╩╚═└─┘└─┘└─┘└─┘┴└─└─┘└─┘└─┘ | |
// | |
()==========>>======================================-- | |
\\ | |
2FA Bypass |
import ast | |
import re | |
import urllib.request, json | |
from urllib.parse import urlparse | |
def parseScopeIn(scopeIn): | |
targetData = [] | |
if not scopeIn: | |
return targetData | |
smallAll = str(scopeIn)[1:-1] |