... to toy with and run curl against it.
This is not advice on how to run anything in production. This is for development and experimenting.
An existing local HTTP/1.1 server that hosts files. Preferably also a few huge ones.
#!/bin/bash | |
# Use this as initial axiom's script on reconftw.cfg file to copy config files to the fleet | |
axiom-exec 'mkdir -p /home/op/.config/amass/ /home/op/Tools/ /home/op/.config/subfinder/ /home/op/.config/notify/' | |
axiom-scp ~/.config/amass/config.ini '*':/home/op/.config/amass/config.ini | |
axiom-scp ~/Tools/h8mail_config.ini '*':/home/op/Tools/h8mail_config.ini | |
axiom-scp ~/Tools/.github_tokens '*':/home/op/Tools/.github_tokens | |
axiom-scp ~/.config/notify/notify.conf '*':/home/op/.config/notify/notify.conf | |
axiom-scp ~/Tools/.gitlab_tokens '*':/home/op/Tools/.gitlab_tokens |
''' | |
Based on the initial work of Digininja at https://github.com/digininja/CeWL. While CeWL is a script written | |
in Ruby that requires an independent crawl of a website in order to build a custom wordlist, Whey CeWLer | |
runs within Portswigger's Burp Suite and parses an already crawled sitemap to build a custom wordlist. It | |
does not have the meta data parsing capabilities that CeWL does, but it more than makes up for it in | |
convenience. | |
The name gets its origins from the CeWLer portion of the CO2 Burp extension by Jason Gillam, which is written | |
in Java and does something similar, but Whey CeWLer is a completely reimagined extension written in Python, | |
making it "way cooler". |
Simply try to change the domain
Example: ?redirect=https://example.com --> ?redirect=https://evil.com
Bypass the filter when protocol is blacklisted using //
Example: ?redirect=https://example.com --> ?redirect=//evil.com
0 | |
001 | |
002 | |
003 | |
01 | |
02 | |
03 | |
1 | |
2 | |
2014 |
TiVoConnect?Command=QueryServer | |
TiVoConnect?Command=QueryContainer&Container=/&Recurse=Yes | |
cgi-bin/cart32.exe | |
cgi-bin/classified.cgi | |
cgi-bin/download.cgi | |
cgi-bin/flexform.cgi | |
cgi-bin/flexform | |
cgi-bin/lwgate.cgi | |
cgi-bin/LWGate.cgi | |
cgi-bin/lwgate |
#https://github.com/m4ll0k/Bug-Bounty-Toolz/blob/master/ssrf.py | |
import aiohttp | |
import asyncio | |
import urllib3 | |
import sys | |
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning) | |
injectable_headers = [ |
{"lastUpload":"2021-08-31T08:20:42.057Z","extensionVersion":"v3.4.3"} |
// This injects a box into the page that moves with the mouse; | |
// Useful for debugging | |
async function installMouseHelper(page) { | |
await page.evaluateOnNewDocument(() => { | |
// Install mouse helper only for top-level frame. | |
if (window !== window.parent) | |
return; | |
window.addEventListener('DOMContentLoaded', () => { | |
const box = document.createElement('puppeteer-mouse-pointer'); | |
const styleElement = document.createElement('style'); |