Skip to content

Instantly share code, notes, and snippets.

@santaklouse
santaklouse / gist:41a59e0c79374cf479ffbdddd280328d
Created November 15, 2024 16:06
chisel inside container share
on vps (proxy.wrtc.pp.ua):
$ chisel server --proxy https://proxy-seller.com/ --auth foo:bazz -v --socks5 --port 8080 --reverse
on target machines:
(inside container)
limactl start \
--containerd=user \
--name=default \
--cpus=4 \
@santaklouse
santaklouse / Dockerfile
Created August 31, 2024 20:21
php-8.2 Dockerfile
FROM php:8.2-fpm
WORKDIR /var/www
RUN apt-get update && apt-get install -y \
build-essential \
libpng-dev \
libjpeg-dev \
libfreetype6-dev \
libonig-dev \
import socket
import os
import logging
import psutil
WOL_PORT = 9
INTERFACE_NAME = 'Ethernet 4'
logging.basicConfig(format='%(levelname)s: %(asctime)s %(message)s', level=logging.INFO)
logger = logging.getLogger(__name__)
version: '3'
services:
socks5:
image: serjs/go-socks5-proxy
restart: always
depends_on:
- zerotier-one
ports:
- 1080:1080
zerotier-one:
@santaklouse
santaklouse / bashrc.sh
Created April 12, 2024 12:40
logs user input to log (add to /etc/bash.bashrc)
function log2syslog
{
declare COMMAND
COMMAND=$(fc -ln -0)
logger -p local1.notice -t bash -i -- "${USER}:${SUDO_USER}:${COMMAND}"
}
trap log2syslog DEBUG
@santaklouse
santaklouse / README.md
Last active January 12, 2024 12:50
gsocket ssh using disposable thc servers
@santaklouse
santaklouse / index.md
Created December 8, 2023 01:53 — forked from paj28/index.md

Unicode XSS via Combining Characters

Most application security practitioners are familiar with Unicode XSS, which typically arises from the Unicode character fullwidth-less-than-sign. It’s not a common vulnerability but does occasionally appear in applications that otherwise have good XSS protection. In this blog I describe another variant of Unicode XSS that I have identified, using combining characters. I’ve not observed this in the wild, so it’s primarily of theoretical concern. But the scenario is not entirely implausible and I’ve not otherwise seen this technique discussed, so I hope this is useful.

Recap of Unicode XSS

Lab: https://4t64ubva.xssy.uk/

A quick investigation of the lab shows that it is echoing the name parameter, and performing HTML escaping:

@santaklouse
santaklouse / README.md
Created October 3, 2023 20:58
share text or images (tmp store on free anon file servers)

Create patch

create raw binary git patch file for untracked files only (exclude: zip archives/files/ directory/*.patch files)

$ { for next in $( git ls-files --others --exclude-standard --exclude=*.zip --exclude=files/* -x '*.patch') ; do git --no-pager diff -p --ignore-space-change --ignore-cr-at-eol --raw --binary -b -w --no-index /dev/null $next; done; } > untracked.patch

Apply patch

show information about changes that will be applied