cat introspection_query.json
{
"query": "query IntrospectionQuery {
__schema {
queryType { name }
mutationType { name }| Registration Feature Security Testing |
| #!/usr/bin/env python3 | |
| """ | |
| Python script to enumerate valid Microsoft 365 domains, retrieve tenant name, and check for an MDI instance. | |
| Based on: https://github.com/thalpius/Microsoft-Defender-for-Identity-Check-Instance. | |
| Usage: ./check_mdi.py -d <domain> | |
| """ | |
| import argparse | |
| import dns.resolver |
| `-=[SQL injection Queries]=- | |
| HOW TO SUCCESSFULLY INJECTING SQL INJECTION | |
| [~] after id no. like id=1 +/*!and*/+1=0 [~] | |
| EX: site.com?index.php?pageid=3 div+0 Union select 1,version(),3,4,5 | |
| +div+0 | |
| +div false | |
| +Having+1=0+ |
| import requests | |
| CRLF = '\r\n' | |
| DEFAULT_HTTP_VERSION = 'HTTP/1.1' | |
| class RequestParser(object): | |
| def __parse_request_line(self, request_line): | |
| request_parts = request_line.split(' ') |
| #!/usr/bin/env python3 | |
| import sys | |
| import requests | |
| import urllib3 | |
| import json | |
| import re | |
| from types import SimpleNamespace as Namespace | |
| from feedgen.feed import FeedGenerator | |
| output = '' |
| 0 | |
| 00 | |
| 01 | |
| 02 | |
| 03 | |
| 1 | |
| 1.0 | |
| 10 | |
| 100 | |
| 1000 |
| # github.com/ndavison | |
| import requests | |
| import random | |
| import string | |
| from argparse import ArgumentParser | |
| parser = ArgumentParser(description="Attempts to find hop-by-hop header abuse potential against the provided URL.") | |
| parser.add_argument("-u", "--url", help="URL to target (without query string)") |
| 0 | |
| 1 | |
| 11 | |
| 12 | |
| 13 | |
| 14 | |
| 15 | |
| 16 | |
| 17 | |
| 2 |
| ` | |
| ~/ | |
| ~ | |
| ×™× | |
| ___ | |
| __ | |
| _ |