Skip to content

Instantly share code, notes, and snippets.

View EdOverflow's full-sized avatar
I swear there was an XSS somewhere around here...

EdOverflow EdOverflow

I swear there was an XSS somewhere around here...
View GitHub Profile
www.nulloy.com
geoway.xyz
electriceel.xyz
cheriandcherie.com
ysm.life
yetanothergamestudio.com
woholer.info
wnereiz.net
webdevroom.net
waitlist.live
@EdOverflow
EdOverflow / blockstack
Last active September 28, 2019 16:14
Verifying my Blockstack ID is secured with the address 1C7SnTWig9cr3cuPhAeC4BoMhA4yejXC8m https://explorer.blockstack.org/address/1C7SnTWig9cr3cuPhAeC4BoMhA4yejXC8m
Verifying my Blockstack ID is secured with the address 1C7SnTWig9cr3cuPhAeC4BoMhA4yejXC8m https://explorer.blockstack.org/address/1C7SnTWig9cr3cuPhAeC4BoMhA4yejXC8m
@EdOverflow
EdOverflow / code_snippets.md
Last active March 3, 2018 17:51
Ed's code snippets.

Ed's code snippets

@EdOverflow
EdOverflow / H1-Report-ID-Bookmark
Created March 3, 2018 17:57
Add this as a bookmark to quickly navigate to HackerOne reports with just the report ID.
javascript:var%20report=prompt("Report%20ID:","");window.location.href="https://hackerone.com/reports/"+report;
@EdOverflow
EdOverflow / googlegroups.sh
Created April 5, 2018 14:06
Find a public Google group for a particular host. Some of these groups contain sensitive information. The tool runs against a list of hosts and returns all public groups.
#!/bin/bash
# Find a public Google group for a particular host.
# Some of these groups contain sensitive information.
# The tool runs against a list of hosts and returns all public groups.
while read domain; do
if curl -LIs "https://groups.google.com/a/$domain" | grep "overview" > /dev/null; then
echo "[+] https://groups.google.com/a/$domain/forum/#!overview"
fi
@EdOverflow
EdOverflow / gitgrepper
Created April 19, 2018 15:27
Simple Bash script to find interesting data in GIT logs.
#!/bin/bash
echo "*** Running..."
keywords=(
"password"
"key"
"passwd"
"secret"
)
@EdOverflow
EdOverflow / reddit.sh
Created April 28, 2018 20:04
Use reddit.com for recon purposes.
#!/bin/bash
# Variables
BOLD='\033[1m'
END='\033[0m'
# Queries
site_results=$(curl -Ls "https://www.reddit.com/search?q=site%3A$1" -H "User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0" | tidy -q 2> /dev/null | grep "search-link")
url_results=$(curl -Ls "https://www.reddit.com/search?q=url%3A$1" -H "User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0" | tidy -q 2> /dev/null | grep "search-link")
self_results=$(curl -Ls "https://www.reddit.com/search?q=selftext%3A$1" -H "User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0" | grep "search-title")
@EdOverflow
EdOverflow / bucket-disclose.sh
Created July 6, 2018 17:42 — forked from fransr/bucket-disclose.sh
Using error messages to decloak an S3 bucket. Uses soap, unicode, post, multipart, streaming and index listing as ways of figure it out. You do need a valid aws-key (never the secret) to properly get the error messages
#!/bin/bash
# Written by Frans Rosén (twitter.com/fransrosen)
_debug="$2" #turn on debug
_timeout="20"
#you need a valid key, since the errors happens after it validates that the key exist. we do not need the secret key, only access key
_aws_key="AKIA..."
H_ACCEPT="accept-language: en-US,en;q=0.9,sv;q=0.8,zh-TW;q=0.7,zh;q=0.6,fi;q=0.5,it;q=0.4,de;q=0.3"
H_AGENT="user-agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.146 Safari/537.36"
@EdOverflow
EdOverflow / ghcheck
Created April 6, 2019 15:26
Quickly determine the validity and scope of a GitHub access token.
#!/bin/bash
GREEN='\033[0;32m'
RED='\033[0;31m'
END='\033[0m'
request=$(curl -s -u "hehe:$1" https://api.github.com/user)
name=$(echo "$request" | jq -r ".login" 2> /dev/null)
if [[ $name == "null" ]]; then
echo -e "${RED}Not a GitHub access token.${END}"