... or Why Pipelining Is Not That Easy
Golang Concurrency Patterns for brave and smart.
By @kachayev
#!/usr/bin/env python | |
"""Simple HTTP Server With Upload. | |
This module builds on BaseHTTPServer by implementing the standard GET | |
and HEAD requests in a fairly straightforward manner. | |
""" |
... or Why Pipelining Is Not That Easy
Golang Concurrency Patterns for brave and smart.
By @kachayev
[+] Entered shellcode | |
[+] UID: 0, GID: 0 | |
[DIR]: . | |
[DIR]: .. | |
[DIR]: adm | |
[DIR]: app_tmp | |
[DIR]: data | |
[DIR]: dev | |
[DIR]: eap_user | |
[DIR]: eap_vsh |
Original source: https://github.com/0xced/iOS-Artwork-Extractor/wiki/Extracting-more-artwork
You can extract even more artwork if you decrypt and mount an iOS firmware (.ipsw file).
<!doctype html> | |
<html lang="en"> | |
<head> | |
<meta charset="utf-8"> | |
<title>Viewport Test</title> | |
<meta name="viewport" content="width=device-width, initial-scale=1"> | |
<script src="/workaround.js"></script> | |
</head> | |
<body> |
2070 Paradigm Shift Transcript | |
Transcribed by Edwin Finch | |
Sam, you're a legend. Enjoy | |
============================== | |
Whew. | |
Hey. |
#!/bin/bash | |
# Send a Twilio SMS when a person logs in over SSH or uses sudo. Michael Fincham <[email protected]> 2017-05-22 | |
# | |
# For a Debian host: | |
# - Install the packages for libpam-script and curl | |
# - Edit this script to set the configuration variables, and place it in /usr/share/libpam-script/pam_script_acct | |
# - Add this line to /etc/pam.d/common-account: | |
# account optional pam_script.so |
/* SMBLoris attack proof-of-concept | |
* | |
* Copyright 2017 Hector Martin "marcan" <[email protected]> | |
* | |
* Licensed under the terms of the 2-clause BSD license. | |
* | |
* This is a proof of concept of a publicly disclosed vulnerability. | |
* Please do not go around randomly DoSing people with it. | |
* | |
* Tips: do not use your local IP as source, or if you do, use iptables to block |
GitHub repositories can disclose all sorts of potentially valuable information for bug bounty hunters. The targets do not always have to be open source for there to be issues. Organization members and their open source projects can sometimes accidentally expose information that could be used against the target company. in this article I will give you a brief overview that should help you get started targeting GitHub repositories for vulnerabilities and for general recon.
You can just do your research on github.com, but I would suggest cloning all the target's repositories so that you can run your tests locally. I would highly recommend @mazen160's GitHubCloner. Just run the script and you should be good to go.
$ python githubcloner.py --org organization -o /tmp/output
#!/jb/bin/bash | |
CYCRIPT_PORT=1337 | |
function help { | |
echo "Syntax: $0 [-p PID | -P appname] [-l /path/to/yourdylib | -L feature]" | |
echo | |
echo For example: | |
echo " $0 -P Reddit.app -l /path/to/evil.dylib # Injects evil.dylib into the Reddit app" | |
echo " or" |