Skip to content

Instantly share code, notes, and snippets.

View vsec7's full-sized avatar

Viloid vsec7

View GitHub Profile
@vsec7
vsec7 / gen_dhl_awb.sh
Created April 7, 2021 04:39
Generate random awb DHL (delivered only)
echo;while :;do d=10;a=$(date +%s);b=$((a*RANDOM));while [ ${#b} -lt 10 ]; do b="${b}$RANDOM";done;g=$(curl -s "https://mydhl.express.dhl/shipmentTracking?AWB=$(echo "${b:0:d}")&countryCode=id&languageCode=en" | jq .results[0]); if [ $(echo $g | jq -r .delivery.status) == "delivered" ]; then printf "%s | %s| ori: %s | dest: %s\n" "$(echo $g | jq -r .id)" "$(echo $g | jq -r .checkpoints[0].date)" "$(echo $g | jq -r .origin.value)" "$(echo $g | jq -r .destination.value)" | tee -a dhlawb.txt;fi;done
#!/usr/bin/env bash
# Search Program Bug Bounty
# By Viloid
# ./bblist.sh <search>
get=$(curl -s "https://raw.githubusercontent.com/disclose/disclose/master/program-list/program-list.json" | jq '.[]|select(.program_name|test("'$1'"; "i"))' | jq -s '[.[]]')
echo $get | jq
@vsec7
vsec7 / nhentai.sh
Created June 14, 2020 04:47
[OneLiner] [bash] Bypass internet positive + mass image downloader nhentai.net
read -p "ID : " id;mkdir $id;cd $_;xargs -n1 -I{} sh -c 'curl --progress-bar -O -H "Origin: rincans.io" "https://cors-anywhere.herokuapp.com/{}"' <<< `curl -s -H "Origin: rincans.io" "https://cors-anywhere.herokuapp.com/https://nhentai.net/g/$id/" | grep -Po 'data-src="\K[^"]+' | grep -v thumb`
#!/usr/bin/env bash
# by : sec7or
base="https://www.instagram.com"
ua="Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Mobile Safari/537.36"
# login $user $pass
login(){
csrf=$(curl -Is "$base/accounts/login/" | grep -oP 'csrftoken=\K[^;]+')
curl -s -c "cookie.txt" "$base/accounts/login/ajax/" \

Keybase proof

I hereby claim:

  • I am vsec7 on github.
  • I am cans21 (https://keybase.io/cans21) on keybase.
  • I have a public key ASCCatheOxs0VJHn9jgLFpmtgYImVJ1DW1GE86i92FglhAo

To claim this, I am signing this object: