From Terminal
# install dependencies
brew install autoconf # required by pecl
brew install libzip
# install zip extenion in your selected MAMP PHP version
ls /Applications/MAMP/bin/php/
From Terminal
# install dependencies
brew install autoconf # required by pecl
brew install libzip
# install zip extenion in your selected MAMP PHP version
ls /Applications/MAMP/bin/php/
| <</div>script</div>>alert()<</div>/script</div>> | |
| <</p>script</p>>alert()<</p>/script</p>> | |
| <</h1>script</h1>>alert()<</h1>/script</h1>> |
| #!/usr/bin/env python2 | |
| #============================================================================================================# | |
| #======= Simply injects a JavaScript Payload into a GIF. ====================================================# | |
| #======= or it creates a JavaScript Payload as a GIF. ====================================================# | |
| #======= The resulting GIF must be a valid (not corrupted) GIF. =============================================# | |
| #======= Author: marcoramilli.blogspot.com ==================================================================# | |
| #======= Version: PoC (don't even think to use it in development env.) ======================================# | |
| #======= Disclaimer: ========================================================================================# | |
| #THIS IS NOT PEP3 FORMATTED | |
| #THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS" AND ANY EXPRESS OR |
| // ==UserScript== | |
| // @name Log lists of domain in Google search results | |
| // @namespace http://tampermonkey.net/ | |
| // @version 0.1 | |
| // @description try to take over the world! | |
| // @author You | |
| // @match https://www.google.com/search?q=* | |
| // @grant none | |
| // ==/UserScript== |
| #!/usr/bin/env bash | |
| ################################################## ############## | |
| # Bash Web Requester | |
| # by Aung Khant, http://yehg.net | |
| # License: GPL v2 | |
| # | |
| # takes 2 arguments: | |
| # one is a file with a list of URLs (url like http://site.com/test.asp) | |
| # second is file with regexp compatible pattern that checks page content for matched keywords |
| # https://twitter.com/brsn76945860/status/1171233054951501824 | |
| pip install mmh3 | |
| ----------------------------- | |
| # python 2 | |
| import mmh3 | |
| import requests | |
| response = requests.get('https://cybersecurity.wtf/favicon.ico') | |
| favicon = response.content.encode('base64') |
| # any apps that registers market:// could be part of user selection list | |
| # only google play ID is allowed | |
| # need to check for such application existence then launch the intent. | |
| public static void secureAppStoreLaunch(Context context) { | |
| // you can also use BuildConfig.APPLICATION_ID | |
| String appId = context.getPackageName(); | |
| Intent rateIntent = new Intent(Intent.ACTION_VIEW, | |
| Uri.parse("market://details?id=" + appId)); | |
| boolean marketFound = false; |
| While analyzing the source code, look for the fields or screens where sensitive data is involved. Identify if the application sanitize the screen before being backgrounded by using UIImageView. | |
| Possible remediation method that will set a default screenshot: | |
| @property (UIImageView *)backgroundImage; | |
| - (void)applicationDidEnterBackground:(UIApplication *)application { | |
| UIImageView *myBanner = [[UIImageView alloc] initWithImage:@"overlayImage.png"]; | |
| self.backgroundImage = myBanner; | |
| [self.window addSubview:myBanner]; |
| Enable ATS support. Include exception in ATS declaration in the application plist file. | |
| <key>NSAppTransportSecurity</key> | |
| <dict> | |
| <key>NSExceptionDomains</key> | |
| <dict> | |
| <key>exceptionsite.com</key> | |
| <dict> |
| \.match|\.contains|\@GetMapping|\@PostMapping|\"matches\"|\@RequestMapping|\@PutMapping|\@DeleteMapping|\@PatchMapping|random|org.springframework.validation|javax.validation|SecretKeyFactory|xmlDecoder|xstream|zip|implements Runnable|implements Threads|new Runnable|new Thread|synchronized|newCachedThreadPool|newFixedThreadPool|utf\-8|403|denied|invalid|illegal|catch \(Exception|System\.loadLibrary|Class\.forName|getRuntime\(\)|AccessController.\doPrivileged|implements Serializable|Object deserialize|deserialize|deserialise|ObjectInputStream|KeyGenerator\.getInstance|printStackTrace|X509TrustManager|SSLContext.getInstance\("SSL"\)|\.hostnameVerifier|new TrustManager|System\.out|System\.err|HttpServletRequest|md5|sha1|password|key|pay|credit|createTempFile|class\.newInstance|.loadClass|.newInstance|objectinputstream.readobject|readObject|Pattern.compile|\.compile|DocumentBuilderFactory|SAXReader |