Skip to content

Instantly share code, notes, and snippets.

View rudSarkar's full-sized avatar
:electron:
Negatively Charged

Rudra Sarkar rudSarkar

:electron:
Negatively Charged
View GitHub Profile
var app = new Vue({
el: "#root",
data: {
showingaddModal: false,
showingeditModal: false,
showingdeleteModal: false,
errorMessage: "",
successMessage: "",
users: [],
@rudSarkar
rudSarkar / tcl_library_fix.md
Created May 18, 2019 13:09
IDLE will not launch/Tcl install error Fix

If you use set TCL_LIBRARY=C:\Program Files\Python 3.5\tcl\tcl8.6 set the TCL_LIBRARY for current command session.So when you close your command prompt then it's not work. So the fix is go to System -> Advance System Setting -> Environment Variables

and set variables for user

    Variables name: TCL_LIBRARY
    Variables value: C:\Program Files\Python 3.5\tcl\tcl8.6
<?php
$content = file_get_contents($_GET['url']);
file_put_contents('image.jpg', $content);
?>
@rudSarkar
rudSarkar / vue-route.md
Last active September 14, 2022 20:41
Vue.js Vue Router dynamic route 404 handling to check exist post param or non-exist post param
@rudSarkar
rudSarkar / xss-image.svg
Created August 12, 2019 18:28
SVG Image XSS File
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
@rudSarkar
rudSarkar / CTF365_vpn_fix.md
Created August 17, 2019 11:41
CTF365 OpenVPN Connect problem fix.

Error

Sat Aug 17 17:06:12 2019 WARNING: file 'user-pass.txt' is group or others accessible
Sat Aug 17 17:06:12 2019 OpenVPN 2.4.6 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 30 2018
Sat Aug 17 17:06:12 2019 library versions: OpenSSL 1.1.1c  28 May 2019, LZO 2.10
Sat Aug 17 17:06:12 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts

Edit openssl.cnf to change the TLS version

<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8"/>
<meta name="viewport" content="width=device-width, initial-scale=1">
<link rel="stylesheet" href="https://stackpath.bootstrapcdn.com/bootstrap/4.3.1/css/bootstrap.min.css" integrity="sha384-ggOyR0iXCbMQv3Xipma34MD+dH/1fQ784/j6cY/iJTQUOhcWr7x9JvoRxT2MZw1T" crossorigin="anonymous">
<title>Blood App</title>
<link href="https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css" rel="stylesheet" integrity="sha384-wvfXpqpZZVQGK6TAh5PVlGOfQNHSoD2xbE+QkPxCAFlNEevoEH3Sl0sibVcOQVnN" crossorigin="anonymous">
<link href="https://fonts.googleapis.com/css?family=Jura&display=swap" rel="stylesheet">
<style>

Spawning bash with python:

$ python -c 'import pty; pty.spawn("/bin/bash")'

If python not installed, I use it and it's works like killer

/usr/bin/script -qc /bin/bash /dev/null
@rudSarkar
rudSarkar / SUID.md
Last active May 3, 2020 12:13
Exploiting vulnerable SUID executable to get root access

vulnerable SUID executable

find / -perm -u=s -type f 2>/dev/null

I prefer to use

find / -perm -4000 -type f -exec ls -la {} 2&gt;/dev/null \;

Keybase proof

I hereby claim:

  • I am rudsarkar on github.
  • I am rudra0x01 (https://keybase.io/rudra0x01) on keybase.
  • I have a public key ASDCxTpD58rafHkri5O1l5tSb8g9Q24cLglhvNVTd7LpJgo

To claim this, I am signing this object: