Skip to content

Instantly share code, notes, and snippets.

@rvaughan
rvaughan / all.txt
Created February 4, 2019 16:06 — forked from jhaddix/all.txt
all wordlists from every dns enumeration tool... ever. Please excuse the lewd entries =/
This file has been truncated, but you can view the full file.
.
..
........
@
*
*.*
*.*.*
🐎
@rvaughan
rvaughan / README.md
Created March 20, 2018 14:55
Podcasts

OPML

OPML of podcasts. Often updates.

@rvaughan
rvaughan / README.md
Created March 20, 2018 14:55
Podcasts

OPML

OPML of podcasts. Often updates.

@rvaughan
rvaughan / scraperbbcpollution.py
Created March 16, 2018 13:01 — forked from northernjamie/scraperbbcpollution.py
Python script for scraping pollution data from bbc / earthsense website
from selenium import webdriver
from selenium.webdriver.common.by import By
from selenium.webdriver.support.ui import WebDriverWait
from selenium.webdriver.support import expected_conditions as EC
from selenium.webdriver.common.keys import Keys
import time
import csv
path_to_chromedriver = '/Users/Jamie/Projects/Propolis_Stuff/chromedriver' # change path as needed
@rvaughan
rvaughan / understanding-word-vectors.ipynb
Created March 2, 2018 14:50 — forked from aparrish/understanding-word-vectors.ipynb
Understanding word vectors: A tutorial for "Reading and Writing Electronic Text," a class I teach at ITP. (Python 2.7) Code examples released under CC0 https://creativecommons.org/choose/zero/, other text released under CC BY 4.0 https://creativecommons.org/licenses/by/4.0/
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
@rvaughan
rvaughan / github_bugbountyhunting.md
Created October 7, 2017 07:37 — forked from EdOverflow/github_bugbountyhunting.md
My tips for finding security issues in GitHub projects.

GitHub for Bug Bounty Hunters

GitHub repositories can disclose all sorts of potentially valuable information for bug bounty hunters. The targets do not always have to be open source for there to be issues. Organization members and their open source projects can sometimes accidentally expose information that could be used against the target company. in this article I will give you a brief overview that should help you get started targeting GitHub repositories for vulnerabilities and for general recon.

Mass Cloning

You can just do your research on github.com, but I would suggest cloning all the target's repositories so that you can run your tests locally. I would highly recommend @mazen160's GitHubCloner. Just run the script and you should be good to go.

$ python githubcloner.py --org organization -o /tmp/output