From Terminal
# install dependencies
brew install autoconf # required by pecl
brew install libzip
# install zip extenion in your selected MAMP PHP version
ls /Applications/MAMP/bin/php/
From Terminal
# install dependencies
brew install autoconf # required by pecl
brew install libzip
# install zip extenion in your selected MAMP PHP version
ls /Applications/MAMP/bin/php/
<</div>script</div>>alert()<</div>/script</div>> | |
<</p>script</p>>alert()<</p>/script</p>> | |
<</h1>script</h1>>alert()<</h1>/script</h1>> |
#!/usr/bin/env python2 | |
#============================================================================================================# | |
#======= Simply injects a JavaScript Payload into a GIF. ====================================================# | |
#======= or it creates a JavaScript Payload as a GIF. ====================================================# | |
#======= The resulting GIF must be a valid (not corrupted) GIF. =============================================# | |
#======= Author: marcoramilli.blogspot.com ==================================================================# | |
#======= Version: PoC (don't even think to use it in development env.) ======================================# | |
#======= Disclaimer: ========================================================================================# | |
#THIS IS NOT PEP3 FORMATTED | |
#THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS" AND ANY EXPRESS OR |
// ==UserScript== | |
// @name Log lists of domain in Google search results | |
// @namespace http://tampermonkey.net/ | |
// @version 0.1 | |
// @description try to take over the world! | |
// @author You | |
// @match https://www.google.com/search?q=* | |
// @grant none | |
// ==/UserScript== |
#!/usr/bin/env bash | |
################################################## ############## | |
# Bash Web Requester | |
# by Aung Khant, http://yehg.net | |
# License: GPL v2 | |
# | |
# takes 2 arguments: | |
# one is a file with a list of URLs (url like http://site.com/test.asp) | |
# second is file with regexp compatible pattern that checks page content for matched keywords |
# https://twitter.com/brsn76945860/status/1171233054951501824 | |
pip install mmh3 | |
----------------------------- | |
# python 2 | |
import mmh3 | |
import requests | |
response = requests.get('https://cybersecurity.wtf/favicon.ico') | |
favicon = response.content.encode('base64') |
# any apps that registers market:// could be part of user selection list | |
# only google play ID is allowed | |
# need to check for such application existence then launch the intent. | |
public static void secureAppStoreLaunch(Context context) { | |
// you can also use BuildConfig.APPLICATION_ID | |
String appId = context.getPackageName(); | |
Intent rateIntent = new Intent(Intent.ACTION_VIEW, | |
Uri.parse("market://details?id=" + appId)); | |
boolean marketFound = false; |
While analyzing the source code, look for the fields or screens where sensitive data is involved. Identify if the application sanitize the screen before being backgrounded by using UIImageView. | |
Possible remediation method that will set a default screenshot: | |
@property (UIImageView *)backgroundImage; | |
- (void)applicationDidEnterBackground:(UIApplication *)application { | |
UIImageView *myBanner = [[UIImageView alloc] initWithImage:@"overlayImage.png"]; | |
self.backgroundImage = myBanner; | |
[self.window addSubview:myBanner]; |
Enable ATS support. Include exception in ATS declaration in the application plist file. | |
<key>NSAppTransportSecurity</key> | |
<dict> | |
<key>NSExceptionDomains</key> | |
<dict> | |
<key>exceptionsite.com</key> | |
<dict> |
\.match|\.contains|\@GetMapping|\@PostMapping|\"matches\"|\@RequestMapping|\@PutMapping|\@DeleteMapping|\@PatchMapping|random|org.springframework.validation|javax.validation|SecretKeyFactory|xmlDecoder|xstream|zip|implements Runnable|implements Threads|new Runnable|new Thread|synchronized|newCachedThreadPool|newFixedThreadPool|utf\-8|403|denied|invalid|illegal|catch \(Exception|System\.loadLibrary|Class\.forName|getRuntime\(\)|AccessController.\doPrivileged|implements Serializable|Object deserialize|deserialize|deserialise|ObjectInputStream|KeyGenerator\.getInstance|printStackTrace|X509TrustManager|SSLContext.getInstance\("SSL"\)|\.hostnameVerifier|new TrustManager|System\.out|System\.err|HttpServletRequest|md5|sha1|password|key|pay|credit|createTempFile|class\.newInstance|.loadClass|.newInstance|objectinputstream.readobject|readObject|Pattern.compile|\.compile|DocumentBuilderFactory|SAXReader |