Skip to content

Instantly share code, notes, and snippets.

View 1UC1F3R616's full-sized avatar
:shipit:
Attention is All You Need

Kush Choudhary 1UC1F3R616

:shipit:
Attention is All You Need
View GitHub Profile
@1UC1F3R616
1UC1F3R616 / Burp certificate on Android
Created November 5, 2021 11:30 — forked from PaulSec/Burp certificate on Android
Add your Burp certificate on an Android device
To do so:
1. Export your Burp Certificate
Proxy > Options > CA Certificate > Export in DER format
2. Convert it to PEM
openssl x509 -inform der -in cacert.der -out burp.pem
3. Download it on the device
@1UC1F3R616
1UC1F3R616 / typescript-crash.ts
Created October 4, 2021 06:25 — forked from bradtraversy/typescript-crash.ts
Basic intro to TypeScript (From YouTube Crash Course)
// Basic Types
let id: number = 5
let company: string = 'Traversy Media'
let isPublished: boolean = true
let x: any = 'Hello'
let ids: number[] = [1, 2, 3, 4, 5]
let arr: any[] = [1, true, 'Hello']
// Tuple
:DogeRocket: Bootstrap for Dogecoin Core - 29th January 2021

You can use the bootstrap to get started more quickly with Dogecoin Core, you don't have to wait as long to synchronise the entire chain.

Make sure you have already downloaded the latest Dogecoin Core, 1.14.2! Run the wallet once and then close it.

Download: https://dogecoin.gg/dogecoin-bootstrap-2021-01-29.torrent
Torrent Hash: 9aaaa5c4bd18686d49d6fce7758409349c62567b

The 5 levels of DevOps

  1. Values
  2. Principles
  3. Methods
  4. Practices
  5. Tools

core-values: CAMS

  • culture
  • automation
## Drozer
```
adb forward tcp:31415 tcp:31415
Drozer console connect
## docker
docker run -it fsecurelabs/drozer
drozer console connect --server <phone IP address>
```
@1UC1F3R616
1UC1F3R616 / cloud_metadata.txt
Created January 19, 2021 11:17 — forked from jhaddix/cloud_metadata.txt
Cloud Metadata Dictionary useful for SSRF Testing
## AWS
# from http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html#instancedata-data-categories
http://169.254.169.254/latest/user-data
http://169.254.169.254/latest/user-data/iam/security-credentials/[ROLE NAME]
http://169.254.169.254/latest/meta-data/iam/security-credentials/[ROLE NAME]
http://169.254.169.254/latest/meta-data/ami-id
http://169.254.169.254/latest/meta-data/reservation-id
http://169.254.169.254/latest/meta-data/hostname
http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key
@1UC1F3R616
1UC1F3R616 / JavascriptRecon.md
Created January 19, 2021 04:56
My Javascript Recon Process - BugBounty

Description

This is a simple guide to perform javascript recon in the bugbounty

Steps

  • The first step is to collect possibly several javascript files (more files = more paths,parameters -> more vulns)
  • docker-machine ip
  • docker run busybox is euqalent to docker pull/create busybox; docker start id

-Running applications that needs multiple start steps example redis to get into interactive shell

docker run redis
docker exec -it id_of_running_container redis-cli
# or
docker exec -it id_of_running_container sh # this will give u a shell where u run redis-cli

Matrix Plot

# Import nxviz
import nxviz as nv

# Create the MatrixPlot object: m
m = nv.MatrixPlot(T)

# Draw m to the screen
m.draw()
  • ASN:AS14061
  • asn:AS14061 product:MySQL
  • Server: SQ-WEBCAM
  • vuln:ms17-010
  • Some Filters

    City
    Country
    Geo (coordinates)
 Hostname