Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.
$ python -m SimpleHTTPServer 8000
# | |
# https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet | |
# based on the RSnake original http://ha.ckers.org/xss.html | |
# Retrieved on 2013-11-20 | |
# Much of this wildly obsolete | |
# | |
# XSS Locator 2 | |
'';!--"<XSS>=&{()} |
" _ _ " | |
" _ /|| . . ||\ _ " | |
" ( } \||D ' ' ' C||/ { % " | |
" | /\__,=_[_] ' . . ' [_]_=,__/\ |" | |
" |_\_ |----| |----| _/_|" | |
" | |/ | | | | \| |" | |
" | /_ | | | | _\ |" | |
It is all fun and games until someone gets hacked! |
Each of these commands will run an ad hoc http static server in your current (or specified) directory, available at http://localhost:8000. Use this power wisely.
$ python -m SimpleHTTPServer 8000
var request = require('request'); | |
var unzip = require('unzip'); | |
var csv2 = require('csv2'); | |
request.get('http://s3.amazonaws.com/alexa-static/top-1m.csv.zip') | |
.pipe(unzip.Parse()) | |
.on('entry', function (entry) { | |
entry.pipe(csv2()).on('data', console.log); | |
}) | |
; |
import base64 | |
import hashlib | |
from Crypto import Random | |
from Crypto.Cipher import AES | |
from binascii import unhexlify | |
class AESCipher(object): | |
def __init__(self, key): | |
self.bs = 64 |
""" Flask Session Cookie Decoder/Encoder """ | |
__author__ = 'Wilson Sumanang, Alexandre ZANNI' | |
# standard imports | |
import sys | |
import zlib | |
from itsdangerous import base64_decode | |
import ast | |
# Lib for argument parsing |
from flask import Flask, render_template, request, url_for, redirect, make_response, flash | |
import json | |
from hashlib import md5 | |
from base64 import b64decode | |
from base64 import b64encode | |
from Crypto import Random | |
from Crypto.Cipher import AES | |
app = Flask(__name__) | |
app.secret_key = 'seed removed' |
#!/usr/bin/python3 | |
# Version: 2.0 | |
# Author: Kev | |
import os | |
import sys | |
import threading | |
import datetime | |
from requests.packages.urllib3.exceptions import InsecureRequestWarning | |
import requests |
# Testing for a UEFI Boot | |
ls /sys/firmware/efi/efivars | |
# Connecting to the Internet | |
ping -c 3 www.google.co.uk | |
systemctl start dhcpcd.service | |
# identify the drive | |
lsblk |
from itertools import chain, product | |
import string | |
def dict_all_size(charset, minlength, maxlength): | |
return (''.join(candidate) | |
for candidate in chain.from_iterable(product(charset, repeat=i) | |
for i in range(minlength, maxlength + 1))) | |
print([i for i in dict_all_size(string.hexdigits[:16], 2, 2)]) |