start new:
tmux
start new with session name:
tmux new -s myname
syntax on " Enable syntax highlighting. | |
filetype plugin indent on " Enable file type based indentation. | |
set autoindent " Respect indentation when starting a new line. | |
set expandtab " Expand tabs to spaces. Essential in Python. | |
set tabstop=4 " Number of spaces tab is counted for. | |
set shiftwidth=4 " Number of spaces to use for autoindent. | |
set backspace=2 " Fix backspace behavior on most terminals. | |
set number | |
set incsearch | |
set relativenumber " show relative line numbers |
bind-key 'C-\' send-prefix | |
# Use - to create vertical splits. | |
bind - split-window -v | |
unbind '%' | |
#enable mouse mode | |
set-option -g mouse on | |
# Use | to create horizontal splits. |
#!/bin/bash | |
echo "*** Running..." | |
keywords=( | |
"password" | |
"key" | |
"passwd" | |
"secret" | |
) |
GitHub repositories can disclose all sorts of potentially valuable information for bug bounty hunters. The targets do not always have to be open source for there to be issues. Organization members and their open source projects can sometimes accidentally expose information that could be used against the target company. in this article I will give you a brief overview that should help you get started targeting GitHub repositories for vulnerabilities and for general recon.
You can just do your research on github.com, but I would suggest cloning all the target's repositories so that you can run your tests locally. I would highly recommend @mazen160's GitHubCloner. Just run the script and you should be good to go.
$ python githubcloner.py --org organization -o /tmp/output
Note: Please keep in mind, that all of this does not work if you are not signed in to GitHub.
When searching for issues related to a target I often like to quickly look up their GitHub organization on Google.
So let's say Gratipay says nothing about being open source. A quick Google "Gratipay GitHub" should return Gratipay's org page on GitHub.
Then from there I am going to check what repos actually belong to the org and which are forked. You can do this by selecting the Type:
dropdown on the right hand side of the page.
/http://example.com | |
/%5cexample.com | |
/%2f%2fexample.com | |
/example.com/%2f%2e%2e | |
/http:/example.com | |
/?url=http://example.com&next=http://example.com&redirect=http://example.com&redir=http://example.com&rurl=http://example.com | |
/?url=//example.com&next=//example.com&redirect=//example.com&redir=//example.com&rurl=//example.com | |
/?url=/\/example.com&next=/\/example.com&redirect=/\/example.com | |
/redirect?url=http://example.com&next=http://example.com&redirect=http://example.com&redir=http://example.com&rurl=http://example.com | |
/redirect?url=//example.com&next=//example.com&redirect=//example.com&redir=//example.com&rurl=//example.com |
admin account info" filetype:log | |
!Host=*.* intext:enc_UserPassword=* ext:pcf | |
"# -FrontPage-" ext:pwd inurl:(service | authors | administrators | users) "# -FrontPage-" inurl:service.pwd | |
"AutoCreate=TRUE password=*" | |
"http://*:*@www” domainname | |
"index of/" "ws_ftp.ini" "parent directory" | |
"liveice configuration file" ext:cfg -site:sourceforge.net | |
"parent directory" +proftpdpasswd | |
Duclassified" -site:duware.com "DUware All Rights reserved" | |
duclassmate" -site:duware.com |
#!/bin/bash | |
# Find a public Google group for a particular host. | |
# Some of these groups contain sensitive information. | |
# The tool runs against a list of hosts and returns all public groups. | |
while read domain; do | |
if curl -LIs "https://groups.google.com/a/$domain" | grep "overview" > /dev/null; then | |
echo "[+] https://groups.google.com/a/$domain/forum/#!overview" | |
fi |
bookmarks |