Skip to content

Instantly share code, notes, and snippets.

View 0xh7ml's full-sized avatar
:electron:
ggwp 🥉

Md Saikat 0xh7ml

:electron:
ggwp 🥉
View GitHub Profile
@0xh7ml
0xh7ml / token_spray_automation.sh
Created November 11, 2021 06:12 — forked from aufzayed/token_spray_automation.sh
search for leaked data (tokens, secrets) in JavaScript files and validate them with nuclei token spray
# requirements:
# gf -> https://github.com/tomnomnom/gf
# gf patterns to find leaked tokens and secrets -> https://github.com/emadshanab/Gf-Patterns-Collection
# subjs -> https://github.com/lc/subjs
# gau -> https://github.com/lc/gau
# nuclei -> https://github.com/projectdiscovery/nuclei
# hakcheckurl -> https://github.com/hakluke/hakcheckurl
# note: before you run the script, edit your gf patterns and remove all grep 'H' and 'n' flag and add the 'h' flag
@0xh7ml
0xh7ml / JavascriptRecon.md
Created November 4, 2021 18:43
My Javascript Recon Process - BugBounty

Description

This is a simple guide to perform javascript recon in the bugbounty

Steps

  • The first step is to collect possibly several javascript files (more files = more paths,parameters -> more vulns)
@0xh7ml
0xh7ml / all.txt
Created September 18, 2021 18:07 — forked from jhaddix/all.txt
all wordlists from every dns enumeration tool... ever. Please excuse the lewd entries =/
This file has been truncated, but you can view the full file.
.
..
........
@
*
*.*
*.*.*
🐎
#!/bin/bash
import requests
from bs4 import BeautifulSoup as bs
from urllib.parse import urljoin
def js(domain):
session = requests.Session()
session.headers["User-Agent"] = "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.157 Safari/537.36"
html = session.get(domain).content
soup = bs(html, "html.parser")

Keybase proof

I hereby claim:

  • I am 0xh7ml on github.
  • I am 0xsasuke (https://keybase.io/0xsasuke) on keybase.
  • I have a public key ASCn_XJwTD3ILHr_j5XvOWzpyj4Wmt2LLtn2FkfmhdxElAo

To claim this, I am signing this object:

@0xh7ml
0xh7ml / GoldDigger
Created September 15, 2020 12:00 — forked from j3rrykh4n/GoldDigger
Look for Hole and dig everything ~_~
Technology
Subdomain Enumeration:
# Basic usage
subfinder -d example.com > example.com.subs
# Recursive
subfinder -d example.com -recursive -silent -t 200 -v -o example.com.subs
scan target for pentest
nmap -PN -n -A -sS -p- -oN output.nmap <IP>
-Pn : no ping check (host is up),
-n no dns resolution
-A : detect systeme info
-sT : tcp connect [laisse des traces dans les logs serveurs] (moins impactant que -sS Syn, ne laisse pas de trace dans les logs par defaut)
-p- : port de 0-65535
-oN output.nmap : write utput to file
ajouter un scan udp en parallèle -sU (dns, ipsec ...)