- Recon
- Find vuln
- Exploit
- Document it
Unicornscans in cli, nmap in msfconsole to help store loot in database.
| { | |
| "description": "Bypass WAFs with 8KB Padding.", | |
| "edition": 2, | |
| "graph": { | |
| "edges": [ | |
| { | |
| "source": { | |
| "exec_alias": "exec", | |
| "node_id": 2 | |
| }, |
| # Get_Early_Stargazers #OSINT #recon trick, by @nil0x42 | |
| # Get list of first people to star a GitHub repository. | |
| # Those are more likely to be closely connected to target org/user | |
| # Run this query with wanted owner/name in GitHub GraphQL explorer: | |
| # - https://developer.github.com/v4/explorer/ | |
| query Get_Early_Stargazers { | |
| repository(owner: "sherlock-project", name: "sherlock") { |
| #!/bin/bash | |
| ##### | |
| # | |
| # St8out - Extra one-liner for reconnaissance | |
| # | |
| # Usage: ./st8out.sh target.com | |
| # | |
| # Resources: | |
| # - https://github.com/j3ssie/metabigor |
| import requests | |
| import re | |
| import sys | |
| from multiprocessing.dummy import Pool | |
| def robots(host): | |
| r = requests.get( | |
| 'https://web.archive.org/cdx/search/cdx\ | |
| ?url=%s/robots.txt&output=json&fl=timestamp,original&filter=statuscode:200&collapse=digest' % host) |
| import requests | |
| import sys | |
| import json | |
| def waybackurls(host, with_subs): | |
| if with_subs: | |
| url = 'http://web.archive.org/cdx/search/cdx?url=*.%s/*&output=json&fl=original&collapse=urlkey' % host | |
| else: | |
| url = 'http://web.archive.org/cdx/search/cdx?url=%s/*&output=json&fl=original&collapse=urlkey' % host |
| CREATE DATABASE pw | |
| WITH | |
| OWNER = XXXXXXXXXXXXXX | |
| ENCODING = 'UTF8' | |
| LC_COLLATE = 'en_US.UTF-8' | |
| LC_CTYPE = 'en_US.UTF-8' | |
| TABLESPACE = pg_default | |
| CONNECTION LIMIT = -1; | |
| CREATE TABLE public.passwords |