Skip to content

Instantly share code, notes, and snippets.

Avatar
🔍
just do good searching

Cihan Mehmet DOĞAN (CMD) cihanmehmet

🔍
just do good searching
View GitHub Profile
View ffufsv2.sh
#!/bin/bash
# Run ffuf with whatever command line flags before running this, but then this will make it pretty after
# ./ffufs.sh <previous ffuf results>
# ./ffufs.sh bla.csv
# Pretty Colors
RESET='\033[00m'
RED='\033[01;31m'
GREEN='\033[01;32m'
BLUE='\033[01;34m'
@hateshape
hateshape / ffufs.sh
Last active May 11, 2021
Run ffuf, but sort results after!
View ffufs.sh
#!/bin/bash
# ./ffufs.sh <WORDLIST> <URL2FUZZ>
# ./ffufs.sh mysuperbestwordlist.txt https://www.bla.com
# Pretty Colors
RESET='\033[00m'
RED='\033[01;31m'
GREEN='\033[01;32m'
BLUE='\033[01;34m'
MAGENTA='\033[01;35m'
@AvasDream
AvasDream / htb.md
Last active Jan 16, 2022
Cheatsheet for HackTheBox
View htb.md

Purpose

Cheatsheet for HackTheBox with common things to do while solving these CTF challenges.

Because a smart man once said:

Never google twice.

Linux General

View xss-game.md

XSS-game by Google

Welcome, recruit! Cross-site scripting (XSS) bugs are one of the most common and dangerous types of vulnerabilities in Web applications. These nasty buggers can allow your enemies to steal or modify user data in your apps and you must learn to dispatch them, pronto!

At Google, we know very well how important these bugs are. In fact, Google is so serious about finding and fixing XSS issues that we are paying mercenaries up to $7,500 for dangerous XSS bugs discovered in our most sensitive products.

In this training program, you will learn to find and exploit XSS bugs. You'll use this knowledge to confuse and infuriate your adversaries by preventing such bugs from happening in your applications.

There will be cake at the end of the test.