Skip to content

Instantly share code, notes, and snippets.

View firedragon9511's full-sized avatar

jvilla firedragon9511

View GitHub Profile
using UnityEngine;
public class SampleAnimations : MonoBehaviour
{
public Transform startPoint;
public Transform endPoint;
[Header("Movement Configuration")]
public float speed = 1f; // Initial movement speed
public bool pingPong = false; // Determines if the movement should ping-pong
using UnityEngine;
public class ObjectViewer : MonoBehaviour
{
public float rotationSpeed = 100f; // Rotation speed
public float zoomSpeed = 2f; // Zoom speed
private Camera mainCamera;
void Start()
import requests
from concurrent.futures import ThreadPoolExecutor
# List of important security headers
SECURITY_HEADERS = [
"Content-Security-Policy",
"Strict-Transport-Security",
"X-Content-Type-Options",
"X-Frame-Options",
"X-XSS-Protection",
import requests
# List of URLs to check
urls = [
"https://example.com",
"https://testsite.com",
"https://anotherexample.com"
]
# Function to check if .git/HEAD is exposed
@firedragon9511
firedragon9511 / port_scanner.py
Created October 15, 2024 00:23
port_scanner.py
#Basic port scanner using Python's socket library
import socket
def port_scan(target, start_port, end_port):
print(f"Scanning {target} from port {start_port} to {end_port}...")
for port in range(start_port, end_port + 1):
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
socket.setdefaulttimeout(1)
result = sock.connect_ex((target, port))
if result == 0:
import flask
app = flask.Flask(__name__)
@app.route('/rotaxss')
def minha_rota():
hijack = flask.request.args.get('cookie')
# todo
app.run(host="0.0.0.0", port=80)
import requests
webSess = requests.Session()
def post(url, data):
return webSess.post(url, data=data)
def get(url):
return webSess.get(url)
@firedragon9511
firedragon9511 / hmac_256.py
Created July 25, 2022 16:19
Generate HMAC
import hashlib
import hmac
import base64
message = bytes('eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpZCI6IjcyNzgxOTMwODI3MTgzIiwibm9tZSI6ImpzdmYiLCJpc0FkbWluIjpmYWxzZX0', 'utf-8')
secret = bytes('minhaChave123', 'utf-8')
signature = base64.b64encode(hmac.new(secret, message, digestmod=hashlib.sha256).digest())
print(signature.decode().replace('+','-').replace('/','_').replace('=',''))
import re
txt2 = '''
// Type Juggling Regex
if ( "0" == 0 )
if ( "0" === 0 )
'''
print(re.findall('if[\s]{0,}\([\s]{0,}.*[^=]==[^=].*\)', txt2))
import argparse
from argparse import RawTextHelpFormatter
banner = '''
[Cole aqui o banner gerado no link acima]
'''
parser = argparse.ArgumentParser(description=banner, formatter_class=RawTextHelpFormatter)
parser.add_argument('-l','--local', dest='local', action='store', type=str, help='Attacker local Host address.', required=True)
parser.add_argument('-p','--port', dest='port', action='store', type=str, help='Attacker local Port address.', default='53')