Skip to content

Instantly share code, notes, and snippets.

View sdushantha's full-sized avatar

Siddharth Dushantha sdushantha

View GitHub Profile
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
@sdushantha
sdushantha / trending-gists.md
Created February 4, 2026 08:20
Trending Gists
@sdushantha
sdushantha / discover-gists.md
Created February 4, 2026 08:18
Discover Gists

Discover Gists

Did it work?

<title>]1337;RequestAttention=fireworksTHIS IS FINE🔥!</title>
</title>
<meta name="Injection" content="
cE
]1337;ClearScrollback

cllcccccc:::::::ccll:,lOKKKKKKKKKKKKKKKKXKKKKKKKXKKKKKXKKKKKKKKKKKKKKKKK0c,cc:;:
ccccc::::::cllllllcclONMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMKc:lccc
:cccc::ccclllcccl::xNMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMO;;c::
llllllllccccccccc,oNMMMWKOOKNWNWWWN0KNMMMMMWNNXKNMMMMWXKXNMWWWWWNKNMMMMMMMXc'::;
@sdushantha
sdushantha / kerberos_attacks_cheatsheet.md
Created May 26, 2025 14:16 — forked from TarlogicSecurity/kerberos_attacks_cheatsheet.md
A cheatsheet with commands that can be used to perform kerberos attacks

Kerberos cheatsheet

Bruteforcing

With kerbrute.py:

python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>

With Rubeus version with brute module:

#!/usr/bin/python3
#
# POC of RCE on Fuel CMS v1.4.1 (CVE-2018-16763)
#
# Original author: Padsala Trushal
# Modified by: Siddharth Dushantha
#
# Modifications that've been made:
# - Cleaned output so that the word 'system' did not
# appear in every output
@sdushantha
sdushantha / fetch-words.sh
Last active August 19, 2025 01:45
List of all Wordle's 14,855 words fetched directly from Wordle's source code
#!/bin/bash
#
# Code used to fetch all of Wordle's words
#
# Save JavaScript code containing the list of words into wordle.js
curl https://www.nytimes.com/games-assets/v2/wordle.b53d5fe794f17d174ac9.js > wordle.js
# Get the array containing the list of words and remove array specific characters
cat wordle.js| grep -oE 'va=\[[^]]*]' | sed -e "s/va=\[//g" -e "s/\"//g" -e "s/,/\n/g" -e "s/]//g" > wordle-full-list.txt

|Url |Contact |Expires |Encryption |Acknowledgments |Languages |Policy |Hiring | |------------------------------------------------------------|-----------------------------------------------|-------------------------------|-----------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------

import requests
import jwt
import argparse
import sys
def get_exernal_object_id(target, token):
headers = {
'Host': 'teams.microsoft.com',
'Authorization': f"Bearer {token}",
@sdushantha
sdushantha / test
Last active February 23, 2023 22:31
hello