Skip to content

Instantly share code, notes, and snippets.

View d1pakda5's full-sized avatar
💻
Working from home

Dipak Kumar Das d1pakda5

💻
Working from home
View GitHub Profile
@d1pakda5
d1pakda5 / all.txt
Created June 15, 2019 18:40 — forked from jhaddix/all.txt
all wordlists from every dns enumeration tool... ever. Please excuse the lewd entries =/
This file has been truncated, but you can view the full file.
.
..
........
@
*
*.*
*.*.*
🐎
This file has been truncated, but you can view the full file.
/
$$$lang-translate.service.js.aspx
$367-Million-Merger-Blocked.html
$defaultnav
${idfwbonavigation}.xml
$_news.php
$search2
£º
.0
@d1pakda5
d1pakda5 / TI-Search-Shortcuts.md
Created March 26, 2019 11:59 — forked from Neo23x0/TI-Search-Shortcuts.md
Search Engine Shortcuts

Search Engine Shortcuts

Use Manage Search Engines in your browser to add these search engines. You can then use the 'keyword' in the URL bar to do a quick lookup. Find more details about managing your search engines in Chrome here.

e.g. Type

v dad8ebcbb5fa6721ccad45b81874e22c
@d1pakda5
d1pakda5 / cve-2019-6340.py
Created February 25, 2019 10:10 — forked from leonjza/cve-2019-6340.py
CVE-2019-6340
#!/usr/bin/env python3
# CVE-2019-6340 Drupal <= 8.6.9 REST services RCE PoC
# 2019 @leonjza
# Technical details for this exploit is available at:
# https://www.drupal.org/sa-core-2019-003
# https://www.ambionics.io/blog/drupal8-rce
# https://twitter.com/jcran/status/1099206271901798400
@d1pakda5
d1pakda5 / setup_bbty.sh
Created February 6, 2019 11:14 — forked from LuD1161/setup_bbty.sh
Setup Bug Bounty Tools on AWS instance / any VPS for that matter
#!/bin/bash
#
# Execute as wget -O - gist_url | bash
#
# Couldn't add gist url as, it changes after every update i.e. as soon as I save this, it's url will change :p
#
# It's debian based, so for centos and likewise you have to change apt to yum and similarly
#
InstallationStartTime=$(date +%s)
@d1pakda5
d1pakda5 / master_script.sh
Created February 6, 2019 11:14 — forked from LuD1161/master_script.sh
Master Script to automate all the recon
#!/bin/bash
if [ -z "$2" ]
then
echo "2nd Argument not supplied"
echo "2nd argument can be basic or advanced,it used for nmap"
echo "Usage : ./master_script.sh domain basic|advanced"
exit 1
fi
@d1pakda5
d1pakda5 / scan.py
Created February 6, 2019 06:38 — forked from rudrasingh99/scan.py
Scan multiple platform for hosts.
#! /usr/bin/env python3
import requests
import re , os
from shodan import Shodan
datalist = []
class Binaryhost():
@d1pakda5
d1pakda5 / pickle-payload.py
Created December 20, 2018 07:32 — forked from mgeeky/pickle-payload.py
Python's Pickle Remote Code Execution payload template.
#!/usr/bin/python
#
# Pickle deserialization RCE payload.
# To be invoked with command to execute at it's first parameter.
# Otherwise, the default one will be used.
#
import cPickle
import sys
import base64
@d1pakda5
d1pakda5 / Google_dorks
Created October 15, 2018 12:19 — forked from zbetcheckin/Google_dorks
Some google dorks useful in footprinting
Replace 'X' with the domain name of your choice
# Back link
link:X -site:X
# Sub domain
site:X -site:www.X
# Url
inurl:X -site:X
@d1pakda5
d1pakda5 / bug bounty monitor - assetnote installation
Created August 31, 2018 12:30 — forked from sz3n/bug bounty monitor - assetnote installation
bug bounty monitor - assetnote installation
Assetnote is a new subdomains supervision tools which allow for real-time notifications about
newlly added subdomains
The tool is especially usefull for bug bounty
As I'm starting playing in bug bounties the tool seems extremelly apealing
The project can be found at https://github.com/infosec-au/assetnote
# installation #
/** My VPS is runing Ubuntu LTS 14.04 **/