Skip to content

Instantly share code, notes, and snippets.

View bl4de's full-sized avatar
🇺🇦
#StandWithUkraine

Rafal Janicki bl4de

🇺🇦
#StandWithUkraine
View GitHub Profile
@bl4de
bl4de / cloud_metadata.txt
Created October 26, 2017 09:22 — forked from BuffaloWill/cloud_metadata.txt
Cloud Metadata Dictionary useful for SSRF Testing
## AWS
# from http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html#instancedata-data-categories
http://169.254.169.254/latest/user-data
http://169.254.169.254/latest/user-data/iam/security-credentials/[ROLE NAME]
http://169.254.169.254/latest/meta-data/iam/security-credentials/[ROLE NAME]
http://169.254.169.254/latest/meta-data/ami-id
http://169.254.169.254/latest/meta-data/reservation-id
http://169.254.169.254/latest/meta-data/hostname
http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key
@bl4de
bl4de / breadcrumbComponent.js
Created October 24, 2017 11:41
Working AngularJS 1.6.6 breadcrumb component
'use strict';
angular.module('breadcrumb-component', [])
.component('breadcrumb', {
restrict: 'E',
bindings: {
path: '<'
},
controller: class breadcrumbCtrl {
constructor() {}
$onInit() {}
@bl4de
bl4de / breadcrumbComponent.js
Created October 24, 2017 09:52
breadcrumbComponent.js
'use strict';
angular.module('gbreadcrumb-component', [])
.component('breadcrumb', {
restrict: 'E',
bindings: {
path: '<',
active: '<'
},
controller: class breadcrumbCtrl {
constructor() {}
import sys
def to_octets(ip):
return [int(i) for i in ip.split('.')]
def dotless_decimal(ip):
octets = to_octets(ip)
result = octets[0] * 16777216 + octets[1] * \
@bl4de
bl4de / exploit.py
Created August 21, 2017 13:11
exploit to extract data with SQLi
#!/usr/bin/env python
# XXXX.asp time-based SQL injection PoC exploit
# Rafal 'bl4de' Janicki
import requests
# base url
@bl4de
bl4de / h1_report_tpl.md
Last active November 16, 2023 07:53
HackerOne report template

Intro

Any information required by PROGRAM, like 'keywords' used by Concrete5, Phabricator etc.

Summary

summary of the vulnerability - where, what, why :)

Steps to reproduce

@bl4de
bl4de / wordlist.txt
Created August 17, 2017 14:37
keywords to look for while white-box source code analysis
api
api_key
api_secret_key
secret_key
secret
BEGIN
PRIVATE
private
PRIVATE_KEY
private_key
(
[
,
ウ, // "o"
,
,
,
ア // "c"
] =
import requests
import sys
import json
def waybackurls(host, with_subs):
if with_subs:
url = 'http://web.archive.org/cdx/search/cdx?url=*.%s/*&output=json&fl=original&collapse=urlkey' % host
else:
url = 'http://web.archive.org/cdx/search/cdx?url=%s/*&output=json&fl=original&collapse=urlkey' % host

Tools of The Bug Hunters Methodology V2

NOTE: The following list has been created based on the PPT "The Bug Hunters Methodology V2 by @jhaddix"

Discovery

  • Sublist3r (Sublist3r is a python tool designed to enumerate subdomains of websites using OSINT).
  • Brutesubs (An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker Compose).
  • Cloudflare_enum (Cloudflare DNS Enumeration Tool for Pentesters).
  • Censys.py (Quick and Dirty script to use the Censys API to query subdomains of a target domain).
  • massdns (A high-performance DNS stub resolver).