Skip to content

Instantly share code, notes, and snippets.

View 0xSojalSec's full-sized avatar
🤒
Out sick

GH0ST_3exP10it 0xSojalSec

🤒
Out sick
View GitHub Profile
(?i)((access_key|access_token|admin_pass|admin_user|algolia_admin_key|algolia_api_key|alias_pass|alicloud_access_key|amazon_secret_access_key|amazonaws|ansible_vault_password|aos_key|api_key|api_key_secret|api_key_sid|api_secret|api.googlemaps AIza|apidocs|apikey|apiSecret|app_debug|app_id|app_key|app_log_level|app_secret|appkey|appkeysecret|application_key|appsecret|appspot|auth_token|authorizationToken|authsecret|aws_access|aws_access_key_id|aws_bucket|aws_key|aws_secret|aws_secret_key|aws_token|AWSSecretKey|b2_app_key|bashrc password|bintray_apikey|bintray_gpg_password|bintray_key|bintraykey|bluemix_api_key|bluemix_pass|browserstack_access_key|bucket_password|bucketeer_aws_access_key_id|bucketeer_aws_secret_access_key|built_branch_deploy_key|bx_password|cache_driver|cache_s3_secret_key|cattle_access_key|cattle_secret_key|certificate_password|ci_deploy_password|client_secret|client_zpk_secret_key|clojars_password|cloud_api_key|cloud_watch_aws_access_key|cloudant_password|cloudflare_api_key|cloudflare_auth_k
@0xSojalSec
0xSojalSec / ports.py
Created May 16, 2022 16:01 — forked from pry0cc/ports.py
Get all ports from an nmap XML output file in the host:ip format
#!/usr/bin/env python
## $ ports.py nmap.xml
## 8.8.8.8:80
## 8.8.8.8:443
## 8.8.8.8:3305
#install requirements: pip install python-libnmap
#uses python 2
@0xSojalSec
0xSojalSec / dumprequest.php
Created May 30, 2022 11:53 — forked from magnetikonline/dumprequest.php
PHP script to dump full HTTP request to file (method, HTTP headers and body).
<?php
// https://gist.github.com/magnetikonline/650e30e485c0f91f2f40
class DumpHTTPRequestToFile {
public function execute($targetFile) {
$data = sprintf(
"%s %s %s\n\nHTTP headers:\n",
$_SERVER['REQUEST_METHOD'],
$_SERVER['REQUEST_URI'],
$_SERVER['SERVER_PROTOCOL']
id: CVE-2022-22947
info:
name: CVE-2022-22947
author: 0x240x23elu
severity: critical
description: Spring Cloud Gateway Actuator API SpEL Code Injection (CVE-2022-22947)
reference:
- https://github.com/vulhub/vulhub/tree/master/spring/CVE-2022-22947
tags: cve,cve2022,rce,spring
id: spring-cloud
info:
name: spring-cloud Exposure
author: 0x240x23elu
severity: info
tags: panel,spring-cloud
requests:
- method: GET
id: Synology
info:
name: Synology
author: 0x240x23elu
severity: info
tags: panel
requests:
- method: GET
id: CVE-2020-3580
info:
name: xss in cisco ASA
author: 0x240x23elu
severity: high
description: xss in cisco ASA
tags: cve,cve2020,cisco
requests:
id: CVE_RCE2-1
info:
name: CVE_RCE2
author: 0x240x23elu
severity: high
requests:
- payloads:
dirt: /mnt/d/tools/alltest/myopen/payload/PayloadsAllTheThings/DirectoryTraversal/Intruder/traversals-8-deep-exotic-encoding.txt
id: wordpress-LFI
info:
name: wordpress-LFI
author: 0x240x23elu
severity: High
requests:
- method: GET
path:
@0xSojalSec
0xSojalSec / CVE-2020-17519
Created July 13, 2022 14:48 — forked from 0x240x23elu/CVE-2020-17519
CVE-2020-17519
id: CVE-2020-17519
info:
name: Apache Flink Arbitrary file reading with JobManager
author: 0x240x23elu & 0rich1 of Ant Security FG Lab
severity: High
requests:
- method: GET
path: