Skip to content

Instantly share code, notes, and snippets.

View trickstersec's full-sized avatar
🎯
Focusing

Jonatan trickstersec

🎯
Focusing
View GitHub Profile
@jhaddix
jhaddix / reconftw.cfg
Last active September 24, 2025 23:27
reconFTW config file: NO google/osint, wordlist creation, nuclei js analysis
#################################################################
# reconFTW config file #
#################################################################
# General values
tools=~/Tools # Path installed tools
SCRIPTPATH="$( cd "$(dirname "$0")" >/dev/null 2>&1 ; pwd -P )" # Get current script's path
profile_shell=".$(basename $(echo $SHELL))rc" # Get current shell profile
reconftw_version=$(git rev-parse --abbrev-ref HEAD)-$(git describe --tags) # Fetch current reconftw version
generate_resolvers=false # Generate custom resolvers with dnsvalidator

When is the next bootcamp gonna start?

TL;DR: It's running! It's online! You can start right away! Check #participate for details!

Confused? Well, let me explain...

The Secureum Bootcamp started out in October 2021 with "Epoch 0" and was divided into LEARN and CARE phase. The LEARN phase ran for 8 weeks and each week had its own "slot". Learning materials for each slot was released week by week and later tested in quizzes.

In December, the 128 best scoring participants (from 1024 total participants) were invited to the CARE phase. Each participant was randomly assigned to one of four projects that partnered up with Secureum for an "audit-like" contest. During this contest participants would review the project's provided code (as one would during an audit) and provide a report of any findings which were aggregated into a single big report in the end.

(?i)((access_key|access_token|admin_pass|admin_user|algolia_admin_key|algolia_api_key|alias_pass|alicloud_access_key|amazon_secret_access_key|amazonaws|ansible_vault_password|aos_key|api_key|api_key_secret|api_key_sid|api_secret|api.googlemaps AIza|apidocs|apikey|apiSecret|app_debug|app_id|app_key|app_log_level|app_secret|appkey|appkeysecret|application_key|appsecret|appspot|auth_token|authorizationToken|authsecret|aws_access|aws_access_key_id|aws_bucket|aws_key|aws_secret|aws_secret_key|aws_token|AWSSecretKey|b2_app_key|bashrc password|bintray_apikey|bintray_gpg_password|bintray_key|bintraykey|bluemix_api_key|bluemix_pass|browserstack_access_key|bucket_password|bucketeer_aws_access_key_id|bucketeer_aws_secret_access_key|built_branch_deploy_key|bx_password|cache_driver|cache_s3_secret_key|cattle_access_key|cattle_secret_key|certificate_password|ci_deploy_password|client_secret|client_zpk_secret_key|clojars_password|cloud_api_key|cloud_watch_aws_access_key|cloudant_password|cloudflare_api_key|cloudflare_auth_k
@s0md3v
s0md3v / shodan_ports.txt
Created April 15, 2022 18:02
list of ports scanned by shodan
7
11
13
15
17
19
20
21
22
23
@sundowndev
sundowndev / GoogleDorking.md
Last active October 25, 2025 07:57
Google dork cheatsheet

Google dork cheatsheet

Search filters

Filter Description Example
allintext Searches for occurrences of all the keywords given. allintext:"keyword"
intext Searches for the occurrences of keywords all at once or one at a time. intext:"keyword"
inurl Searches for a URL matching one of the keywords. inurl:"keyword"
allinurl Searches for a URL matching all the keywords in the query. allinurl:"keyword"
intitle Searches for occurrences of keywords in title all or one. intitle:"keyword"
@vestjoe
vestjoe / Install_Bloodhound_README.md
Last active April 21, 2025 19:10
Install Bloodhound on Ubuntu

Installing BloodHound Community Edition (CE) on Linux

Follow these steps to install BloodHound CE using Docker on a Linux system.

  1. Install Docker Ensure Docker is installed on your system. BloodHound CE relies on Docker Compose for deployment.

You can follow the official Docker installation guide for your distribution: https://docs.docker.com/engine/install/

  1. Download BloodHound CLI
@HarmJ0y
HarmJ0y / PowerView-3.0-tricks.ps1
Last active October 26, 2025 17:23
PowerView-3.0 tips and tricks
# PowerView's last major overhaul is detailed here: http://www.harmj0y.net/blog/powershell/make-powerview-great-again/
# tricks for the 'old' PowerView are at https://gist.github.com/HarmJ0y/3328d954607d71362e3c
# the most up-to-date version of PowerView will always be in the dev branch of PowerSploit:
# https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1
# New function naming schema:
# Verbs:
# Get : retrieve full raw data sets
# Find : ‘find’ specific data entries in a data set
@jhaddix
jhaddix / all.txt
Last active October 26, 2025 12:00
all wordlists from every dns enumeration tool... ever. Please excuse the lewd entries =/
This file has been truncated, but you can view the full file.
.
..
........
@
*
*.*
*.*.*
🐎