Skip to content

Instantly share code, notes, and snippets.

@n1sh1th
n1sh1th / cordova-enable-webview-debug.js
Created October 16, 2021 05:16
Cordova - Enable Webview Debugging
// Usage : frida -U -f bundle_id -l cordova-enable-webview-debug.js --no-pause
Java.perform(function() {
var Webview = Java.use("android.webkit.WebView")
Webview.loadUrl.overload("java.lang.String").implementation = function(url) {
console.log("[+]Loading URL from", url);
this.setWebContentsDebuggingEnabled(true);
this.loadUrl.overload("java.lang.String").call(this, url);
}
});
@n1sh1th
n1sh1th / graphql_introspection_query.graphql
Created May 9, 2021 06:20
GraphQL introspection query - for fetching the whole schema
query IntrospectionQuery {
__schema {
queryType { name }
mutationType { name }
types {
...FullType
}
directives {
name
description
@n1sh1th
n1sh1th / update-golang.sh
Created August 16, 2020 10:43
Updating GO with latest version
# update go
git clone https://github.com/udhos/update-golang
cd update-golang
sudo ./update-golang.sh
@n1sh1th
n1sh1th / tmux.conf
Created August 16, 2020 08:34
Tmux custom config file
#Modifying tmux configurations :
#nano ~/.tmux.conf (If you can't find one create one)
#Source the file to apply changes
#tmux source-file ~/.tmux.conf
# remap prefix from 'C-b' to 'C-a'
unbind C-b
set-option -g prefix C-a
bind-key C-a send-prefix
@n1sh1th
n1sh1th / XSS-beyond-alert(1).txt
Last active December 26, 2023 16:13
XSS Post exploitation
XSS Post exploitation:
https://excess-xss.com/
https://labs.detectify.com/2012/11/07/how-to-exploit-an-xss/
https://medium.com/@hakluke/upgrade-xss-from-medium-to-critical-cb96597b6cc4
https://github.com/hakluke/weaponised-XSS-payloads
https://www.exploit-db.com/exploits/20009
http://www.xssed.com/xssinfo
https://security.stackexchange.com/questions/49185/xss-cookie-stealing-without-redirecting-to-another-page
https://github.com/JohnHoder/Javascript-Keylogger