Skip to content

Instantly share code, notes, and snippets.

@random-robbie
random-robbie / grab_plugins.py
Created Apr 1, 2020
Grab all Plugins for drupal via drupal gitlab.
View grab_plugins.py
import requests
import json
from requests.packages.urllib3.exceptions import InsecureRequestWarning
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
session = requests.Session()
http_proxy = "http://192.168.1.130:8085"
proxyDict = {
"http" : http_proxy,
"https" : http_proxy,
@BlackFan
BlackFan / Bootstrap_XSS.md
Last active Apr 10, 2022
Bootstrap XSS Collection
View Bootstrap_XSS.md

CVE-2019-8331

Bootstrap < 3.4.1 || < 4.3.1

✔️ CSP strict-dynamic bypass

Requires user interaction

Requires $('[data-toggle="tooltip"]').tooltip();

@tomnomnom
tomnomnom / alert.js
Last active May 6, 2022
Ways to alert(document.domain)
View alert.js
// How many ways can you alert(document.domain)?
// Comment with more ways and I'll add them :)
// I already know about the JSFuck way, but it's too long to add (:
// Direct invocation
alert(document.domain);
(alert)(document.domain);
al\u0065rt(document.domain);
al\u{65}rt(document.domain);
window['alert'](document.domain);
@ethicalhack3r
ethicalhack3r / wp_php_object_injection.rb
Last active Feb 9, 2022
Burp Suite Extension to detect PHP Object Injection in WordPress Plugins (read the code comments for additional info)
View wp_php_object_injection.rb
java_import 'burp.IBurpExtender'
java_import 'burp.IScannerCheck'
java_import 'burp.IScanIssue'
require 'java'
java_import 'java.util.Arrays'
java_import 'java.util.ArrayList'
#
# You will need to download JRuby's Complete.jar file from http://jruby.org/download and configure Burp Extender with its path.
View waybackurls.py
import requests
import sys
import json
def waybackurls(host, with_subs):
if with_subs:
url = 'http://web.archive.org/cdx/search/cdx?url=*.%s/*&output=json&fl=original&collapse=urlkey' % host
else:
url = 'http://web.archive.org/cdx/search/cdx?url=%s/*&output=json&fl=original&collapse=urlkey' % host
@cure53
cure53 / wordpress2.md
Last active Jan 8, 2021
WordPress SOME bug in plupload.flash.swf
View wordpress2.md
@cure53
cure53 / wordpress.md
Last active Jan 16, 2022
WordPress Flash XSS in flashmediaelement.swf
View wordpress.md
@atcuno
atcuno / gist:3425484ac5cce5298932
Last active Apr 30, 2022
HowTo: Privacy & Security Conscious Browsing
View gist:3425484ac5cce5298932

The purpose of this document is to make recommendations on how to browse in a privacy and security conscious manner. This information is compiled from a number of sources, which are referenced throughout the document, as well as my own experiences with the described technologies.

I welcome contributions and comments on the information contained. Please see the How to Contribute section for information on contributing your own knowledge.

Table of Contents

@Neo23x0
Neo23x0 / wpwatcher.py
Last active Apr 5, 2020
Wordpress Watcher - WPScan Vulnerabilty Scan on Wordpress Sites and Reporting
View wpwatcher.py
#!/usr/bin/env python
# -*- coding: iso-8859-1 -*-
# -*- coding: utf-8 -*-
#
# Wordpress Watcher
# Automating WPscan to scan and report vulnerable Wordpress sites
# Florian Roth
# v0.1
# March 2015
#
@takeshixx
takeshixx / hb-test.py
Last active May 13, 2022
OpenSSL heartbeat PoC with STARTTLS support.
View hb-test.py
#!/usr/bin/env python2
"""
Author: takeshix <takeshix@adversec.com>
PoC code for CVE-2014-0160. Original PoC by Jared Stafford (jspenguin@jspenguin.org).
Supportes all versions of TLS and has STARTTLS support for SMTP,POP3,IMAP,FTP and XMPP.
"""
import sys,struct,socket
from argparse import ArgumentParser