Tips & advice related to GitHub specific features of git, gpg, and development.
Pentesting-Exploitation Programs and Commands , Protocols Network / Ports
This is a gist used in the following blog posts:
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
systemctl enable ssh; | |
systemctl start ssh; | |
service ssh start; | |
apt-get install gpg-agent; | |
echo "deb http://http.kali.org/kali kali-rolling main contrib non-free" > /etc/apt/sources.list; | |
gpg --keyserver hkp://keys.gnupg.net --recv-key 7D8D0BF6; | |
gpg --fingerprint 7D8D0BF6; | |
gpg -a --export 7D8D0BF6 | apt-key add -; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
'use strict'; | |
const express = require('express'); | |
const bodyParser = require('body-parser'); | |
const { default: RuntimeClientFactory, TraceType } = require("@voiceflow/runtime-client-js"); | |
const {randomBytes} = require('crypto') | |
function generateId(length) { | |
return randomBytes(length).reduce((p, i) => p + (i % 32).toString(32), '') | |
} |
Magic crafts to make Ubuntu much awesomeness.
Install better OSD https://extensions.gnome.org/extension/1345/better-osd/
Size: 7
Hide delay: 1500
// Right bottom:
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
cat ~/domain.txt | httprobe | while read url;do ww=$(for i in "X-Oversized-Header-1: Big_Valuetestetstsetsetstsetestsetsetsetsetsetestsetsetsetsetsetsetsetsetsetesset" "X-Meta-Malicious-Header: \r\n" "X-HTTP-Method-Override: POST" "X-Forwarded-Port: 123" "X-Forwarded-Host: $url:123";do curl -s -L -I -H $i $url;done|grep HTTP|grep -v '301 '|awk '{ printf "%3d: %s\n", NR, $0 }');echo -e "\e[1;32m$url\e[0m""\n""$ww""\n";done |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
resolvers: | |
- 1.1.1.1 | |
- 1.0.0.1 | |
- 8.8.8.8 | |
- 8.8.4.4 | |
- 9.9.9.9 | |
- 9.9.9.10 | |
- 77.88.8.8 | |
- 77.88.8.1 | |
- 208.67.222.222 |
I've transformed this gist into a git repository.
Whenever you research a certain vulnerability ask yourself these questions and please answer them for us
Does the exploited service write a log?
(check ls -lrt /var/log or lsof +D /var/log/ or lsof | grep servicename)
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
parse_user_options() { | |
local -r args=("${@}") | |
local opts | |
# The following code works perfectly for | |
opts=$(getopt --options a:,f,h --long abc:,help,flag -- "${args[@]}" 2> /dev/null) || { | |
usage | |
die "error: parsing options" "${error_parsing_options}" | |
} | |
eval set -- "${opts}" | |
while true; do |