Skip to content

Instantly share code, notes, and snippets.

View j3ssie's full-sized avatar
go ahead, make my day!

Ai Ho (j3ssie) j3ssie

go ahead, make my day!
View GitHub Profile
@j3ssie
j3ssie / codeql-install.sh
Created March 1, 2021 12:32
codeql install script
#!/bin/bash
DEST=$HOME/codeql-home
## really start to do something
[ -d "$DEST" ] && echo "Directory $DEST exists. Remove it before continute"
echo -e "Init CodeQL Home: $DEST"
mkdir -p $DEST
cd $DEST
@j3ssie
j3ssie / disclose.sh
Last active March 4, 2021 03:47
Get Bounty Target from disclose.io but no in hackerone and bugcrowd
# Output will be like this: Program_Name ;; https://www.target.com/security
curl -s https://raw.githubusercontent.com/disclose/diodb/master/program-list.json | jq -r '.[] | select(.offers_bounty=="yes") | .policy_url as $n | [.program_name,$n] | join(" ;; ") ' | grep -v -E 'hackerone|bugcrowd'
<script>alert(1)</script>
socks4://61.8.75.186:1080
socks4://36.89.143.23:14153
socks4://125.27.10.222:39304
socks4://118.174.220.168:59191
socks4://176.105.199.19:43309
socks4://110.44.126.132:38163
socks4://103.245.19.82:59422
socks4://118.175.176.137:31789
socks4://78.57.227.227:64569
socks4://80.78.73.116:1080
@j3ssie
j3ssie / api-acunetix.py
Last active September 4, 2018 04:27
Simple script to issue Acunetix REST API
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
import os, sys, time, json, argparse
from pprint import pprint
import requests
# Console colors
W = '\033[1;0m' # white
R = '\033[1;31m' # red
#!/usr/bin/env python3
import subprocess, psutil, signal
def execute_cmd(command):
cmd = command.split(" ")
subprocess.Popen(cmd, stderr=subprocess.STDOUT)
def cancel_handler(signal=None, frame=None):