Skip to content

Instantly share code, notes, and snippets.

Avatar
😷
Wear mask and stay safe!

Rafal Janicki bl4de

😷
Wear mask and stay safe!
View GitHub Profile
View Dockerfile
FROM python:3.7-stretch as base
RUN mkdir /base
WORKDIR /base
RUN apt-get update
RUN apt-get install -y wget
RUN apt-get -y install libnss3
RUN apt -y install chromium
View fingerprint.js
(() => {
let gadgets = [];
if (typeof _satellite !== 'undefined') {
gadgets.push('Adobe Dynamic Tag Management');
}
if (typeof BOOMR !== 'undefined') {
gadgets.push('Akamai Boomerang');
}
View gd-gif.php
<?php
//php gd-gif.php image.gif gd-image.gif
$gif = imagecreatefromgif($argv[1]);
imagegif($gif, $argv[2]);
imagedestroy($gif);
?>
View introspection-query.graphql
query IntrospectionQuery {
__schema {
queryType { name }
mutationType { name }
subscriptionType { name }
types {
...FullType
}
directives {
@bl4de
bl4de / wfuzz.log
Created Jun 16, 2019
wfuzz against example.com
View wfuzz.log
bl4de:~ $ wfuzz -c --hc 404 -w ~/hacking/dictionaries/starter.txt http://example.com/FUZZ
Warning: Pycurl is not compiled against Openssl. Wfuzz might not work correctly when fuzzing SSL sites. Check Wfuzz's documentation for more information.
********************************************************
* Wfuzz 2.3.4 - The Web Fuzzer *
********************************************************
Target: http://example.com/FUZZ
Total requests: 71935
@bl4de
bl4de / crawl-extract-resolve.sh
Created May 8, 2019 — forked from noraj/crawl-extract-resolve.sh
crawl a web page, extract all domains and resolve them to IP addresses with bash and common GNU/Linux tools
View crawl-extract-resolve.sh
#!/bin/bash
url='rawsec.ml'
domains=$(curl $url -s | grep -E 'https?://[^"]*' | cut -d '/' -f 3 | cut -d '"' -f 1 | uniq)
filename='/tmp/temporary_ips.txt'
for domain in $domains
do
View content_discovery_nullenc0de.txt
This file has been truncated, but you can view the full file.
/
$$$lang-translate.service.js.aspx
$367-Million-Merger-Blocked.html
$defaultnav
${idfwbonavigation}.xml
$_news.php
$search2
£º
.0
@bl4de
bl4de / README.md
Created Apr 5, 2019 — forked from ajxchapman/README.md
Scripts developed for solving HackerOne H1-702 2019 CTF
View README.md

Scripts developed for solving HackerOne H1-702 2019 CTF

  • image_extract.py performs character extraction on targetted against the HackerOne H1-702 CTF announcement image
  • decrypt_sqli.py performs blind sqli data extraction with encrypted payloads targetting against the FliteThermostat API
  • timing_attack.py performs an HTTP piplining based timing against the FliteThermostat Backend
  • wordlist_generator.py generates wordlists from a give corpus or set of corpuses
  • httplib.py performs efficient asynchronous HTTP requests against the FliteThermostat Backend
@bl4de
bl4de / generate.c
Created Mar 4, 2019 — forked from munificent/generate.c
A random dungeon generator that fits on a business card
View generate.c
#include <time.h> // Robert Nystrom
#include <stdio.h> // @munificentbob
#include <stdlib.h> // for Ginny
#define r return // 2008-2019
#define l(a, b, c, d) for (i y=a;y\
<b; y++) for (int x = c; x < d; x++)
typedef int i;const i H=40;const i W
=80;i m[40][80];i g(i x){r rand()%x;
}void cave(i s){i w=g(10)+5;i h=g(6)
+3;i t=g(W-w-2)+1;i u=g(H-h-2)+1;l(u
View CVE-2019-1003000-Jenkins-RCE-POC.py
#!/usr/bin/python
# Author: Adam Jordan
# Date: 2019-02-15
# Repository: https://github.com/adamyordan/cve-2019-1003000-jenkins-rce-poc
# PoC for: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)
import argparse
import jenkins