This gist gather a list of log4shell payloads seen on my twitter feeds.
💨 I will update it every time I see new payloads.
The goal is to allows testing detection regexes defined in protection systems.
# The situation is the following: | |
# Your enter ab in a feature and it return data to you but when your enter ab' it indicate that there is not data found. | |
# | |
# So, does it means that there is no SQLi because ab' is well handled OR the error is catched | |
# and a "not data found message" is returned? | |
# | |
# The goal here is to submit a payload that, if interpreted by the SQL DB, will give ab and then data will be returned | |
# then indicating that there is a SQLi because the payload is interpreted. | |
ab';# | |
ab';-- |
import uuid | |
import binascii | |
from datetime import datetime | |
""" | |
Python3 script trying to reproduce the "Sandwich Attack: A New Way Of Brute Forcing UUIDs" | |
described on "https://versprite.com/blog/universally-unique-identifiers/". | |
""" | |
id: CVE-2022-21449 | |
info: | |
name: CVE-2022-21449 test exposure | |
description: The JDK 15-18 have a vulnerability in validation of ECDSA signature so this template detect exposure to CVE-2022-21449 by the JWT validation API in place. | |
author: righettod | |
severity: info | |
tags: cve,2022,java | |
reference: https://neilmadden.blog/2022/04/19/psychic-signatures-in-java |
This gist gather a list of log4shell payloads seen on my twitter feeds.
💨 I will update it every time I see new payloads.
The goal is to allows testing detection regexes defined in protection systems.
<head> | |
<!-- Big up to https://portswigger.net/web-security/clickjacking labs :) --> | |
<style> | |
.target_website { | |
position:relative; | |
width:800px; | |
height:400px; | |
#Set opacity to 0.5 to see overlay allowing preparation of the attack | |
#Set opacity to 0.00001 to made the target frame site transparent and bypass some browser protection on opacity like one in chrome for example | |
#See https://www.w3schools.com/css/css_image_transparency.asp |
#!/bin/bash | |
echo "Folder:" | |
pwd | |
for line in $(grep -rFc "@WebMethod" * | grep -v ":0") | |
do | |
services_count=$(echo $line | cut -d':' -f2) | |
java_class_file=$(echo $line | cut -d':' -f1) | |
auth_annot_count=$(grep -rFc "@RolesAllowed" $java_class_file) | |
if [ "$services_count" != "$auth_annot_count" ] | |
then |
import UIKit | |
//Inspired from the code below: | |
//https://github.com/takashings/ScreenCapturedSample/blob/master/ScreenCapturedSample/ForScreenCapturedViewController.swift | |
//https://www.hackingwithswift.com/example-code/uikit/how-to-detect-when-the-user-takes-a-screenshot | |
@UIApplicationMain | |
class AppDelegate: UIResponder, UIApplicationDelegate { | |
func application(_ application: UIApplication, didFinishLaunchingWithOptions launchOptions: [UIApplication.LaunchOptionsKey: Any]?) -> Bool { | |
//Define a listener to handle the case when a screen recording is launched |
package eu.righettod.snippet; | |
import org.apache.pdfbox.Loader; | |
import org.apache.pdfbox.pdmodel.PDDocument; | |
import org.apache.pdfbox.pdmodel.PDDocumentCatalog; | |
import org.apache.pdfbox.pdmodel.PDDocumentInformation; | |
import org.apache.pdfbox.pdmodel.PDDocumentNameDictionary; | |
import org.apache.pdfbox.pdmodel.common.PDMetadata; | |
import org.apache.pdfbox.pdmodel.interactive.action.*; | |
import org.apache.pdfbox.pdmodel.interactive.annotation.AnnotationFilter; |
name: HTTP security response headers test suites | |
# TOOLS | |
# VENOM HOME: https://github.com/ovh/venom | |
# VENOM RELEASE: https://github.com/ovh/venom/releases | |
# VENOM ASSERTION KEYWORDS: https://github.com/ovh/venom#assertion | |
# REF AND RUN | |
# REF BASE: https://owasp.org/www-project-secure-headers/ | |
# RUN CMD: venom run --var="target_site=https://righettod.eu" venom_security_headers_tests_suite.yml | |
# venom run --var="target_site=https://righettod.eu" --var="internet_facing=true" venom_security_headers_tests_suite.yml | |
# venom run --var="target_site=https://righettod.eu" --var="internet_facing=true" --var="logout_url=/logout" venom_security_headers_tests_suite.yml |