Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Select an option

  • Save helcaraxeals/6b2e608658bb6586e45dd56577dc1a1f to your computer and use it in GitHub Desktop.

Select an option

Save helcaraxeals/6b2e608658bb6586e45dd56577dc1a1f to your computer and use it in GitHub Desktop.

Revisions

  1. @cyberheartmi9 cyberheartmi9 revised this gist Oct 3, 2020. 1 changed file with 7 additions and 1 deletion.
    8 changes: 7 additions & 1 deletion Bug Bounty methodology
    Original file line number Diff line number Diff line change
    @@ -58,7 +58,13 @@
    Org: evilcorp
    ssl: Google


    https://publicwww.com/
    https://hunter.io/
    https://www.zoomeye.org/
    https://greynoise.io/
    https://shodan.io/
    https://censys.io/
    https://searchcode.com
    fofa.so
    [+] doc
    stroage.googleapis.com/site.com
  2. @cyberheartmi9 cyberheartmi9 revised this gist Aug 21, 2020. 1 changed file with 1 addition and 0 deletions.
    1 change: 1 addition & 0 deletions Bug Bounty methodology
    Original file line number Diff line number Diff line change
    @@ -35,6 +35,7 @@
    www.yougetsignal.com
    [+] CERT
    censys [443.https.tls.certificate.parsed.extensions.subject_alt_name.dns_names:[site.com] ]
    443.https.tls.certificate.parsed.subject.common_name:site.com
    google [https://transparencyreport.google.com/https/certificates?hl=en]
    facebook [https://developers.facebook.com/tools/ct]

  3. @cyberheartmi9 cyberheartmi9 revised this gist Aug 8, 2019. 1 changed file with 8 additions and 3 deletions.
    11 changes: 8 additions & 3 deletions Bug Bounty methodology
    Original file line number Diff line number Diff line change
    @@ -153,12 +153,17 @@
    [+]crtsh
    curl -s https://crt.sh/?q=%.$1 | sed 's/<\/\?[^>]\+>//g' | grep $1

    #!/bin/bash

    echo "[+] Start gather subdomain "
    for i in `cat list.txt`
    do
    curl -s https://crt.sh/?q=$i | sed 's/<\/\?[^>]\+>//g' |tee -a domain.txt
    curl -s https://crt.sh/\?q\=$i\&output\=json | jq -r '.[].name_value'|sed 's/\*\.//g'|sort -u |tee -a domains.txt
    done
    echo "[+] httprope"
    cat domain.txt|httprobe|tee -a live-domain.txt
    echo "[+] httprope "
    cat domains.txt |httprobe|tee live-domain.txt
    echo "[+] End "

    9-AWS SS3
    sandcastle [https://github.com/0xSearches/sandcastle]
    https://github.com/nahamsec/lazys3
  4. @cyberheartmi9 cyberheartmi9 revised this gist Aug 7, 2019. 1 changed file with 207 additions and 269 deletions.
    476 changes: 207 additions & 269 deletions Bug Bounty methodology
    Original file line number Diff line number Diff line change
    @@ -1,270 +1,208 @@
    #find sub domain


    @Identify IPs and main TLDs

    ASNs (http://bgp.he.net)
    Reverse Whois (https://whois.arin.net (Target IP Range) , https://reverse.report/ , http://domainbigdata.com/ , http://viewdns.info/ ,https://apps.db.ripe.net/db-web-ui/#/fulltextsearch)
    Acquisitions (https://www.crunchbase.com/search/acquisitions)
    Trademarks
    Shodan (shodan.io)
    https://censys.io
    https://developers.facebook.com/tools/ct
    https://www.zoomeye.org/
    crt.sh (%.site.com)
    https://transparencyreport.google.com/https/certificates?hl=en
    https://github.com/anshumanbh/brutesubs
    https://github.com/mandatoryprogrammer/cloudflare_enum
    https://github.com/TheRook/subbrute
    https://github.com/blechschmidt/massdns
    https://gist.github.com/jhaddix/86a06c5dc309d08580a018c66354a056 (wordlist DNS)
    https://github.com/jfrancois/SDBF
    sublister
    gobuster
    https://github.com/vysecurity/DomLink
    https://builtwith.com
    https://github.com/blechschmidt/massdns
    https://github.com/sa7mon/S3Scanner

    #####Mobile

    https://apkscan.nviso.be


    ######## other side on same domain
    www.yougetsignal.com


    ##########################################
    https://github.com/nahamsec/bbht
    https://github.com/nahamsec/lazyrecon
    ##########################################
    github amazonaws.com uber

    ############## Find Subdomains of Subdomain ##################
    /subbrute.py target.com > sudomains.txt
    ./subbrute.py –t subdomains.txt



    ###########Leak ##############################################

    gitrob
    git-all-secrets
    truffleHog
    git-secrets
    repo-supervisor



    #AWS SS3
    site:s3.amazonaws.com inurl:site
    sandcastle (https://github.com/0xSearches/sandcastle)
    https://github.com/nahamsec/lazys3


    ###################Dork:
    site.com +inurl:dev -cdn
    site:apkscan.nviso.be site
    site:site.com -www.site.com -www.sanbox

    -site:target.com filetype:php
    - site:target.com filetype:aspx
    - site:target.com filetype:swf (Shockwave Flash)
    - site:target.com filetype:wsdl
    - site: target.com inurl:.php?id=
    - site: target.com inurl:.php?user=
    - site: target.com inurl:.php?book=
    - site: target.com inurl:login.php
    - site: target.com intext: “login”
    - site: target.com inurl:portal.php
    - site: target.com inurl:register.php
    -site: target.com intext: “index of /”
    -site: target.com filetype:txt
    - site: target.com inurl:.php.txt
    -site: target.com ext:txt
    CSP Headers
    fofa.so



    @Permutation scanning & Portscan
    nmap -sS -A -PN -p- --script=http-title site.com

    Altdns
    Sdbf
    nmap
    masscan


    @Visual Identification
    eyewitness

    @AUXiliary

    spider
    Github

    @Platform Identification


    Builtwith
    Wappalyzer
    Vulners Burp Plugin

    @Content Discovery

    #Mapping

    https://github.com/zseano/InputScanner.git
    https://github.com/zseano/JS-Scan.git


    retire.js
    SVN
    git (https://github.com/arthaud/git-dumper.git , https://github.com/michenriksen/gitrob )
    RAFT lists
    Wapplyzer
    Xssed.com
    intrigue (https://github.com/intrigueio/intrigue-core)
    https://github.com/cure53/Flashbang



    Gobuster
    Wordlists
    Burp

    @Parameter discovery
    https://github.com/s0md3v/Arjun
    Parameth
    Burp analyze target
    https://github.com/epinna/tplmap.git


    https://github.com/jhaddix/domain


    #Port scanner:








    #Testing


    #WAF

    tip
    ww1,ww2,ww3, ... site.com
    x.sub.y.com
    x-sub.y.com


    #SQL

    SLEEP(1) /*‘ or SLEEP(1) or ‘“ or SLEEP(1) or “*/

    #SSL
    https://github.com/arvinddoraiswamy/mywebappscripts/tree/master/ForceSSL

    #IOS

    idb tool (https://github.com/dmayer/idb)





    ######################################### SCRIPTS ####################################




    #!/bin/bash
    for ipa in 98.13{6..9}.{0..255}.{0..255}; do
    wget -t 1 -T 5 http://${ipa}/phpinfo.php; done&





    #Rundns

    #!/bin/bash

    ./subbrute.py all.txt $1|/bin/massdns -r resolvers.txt -t A -a -o -w $1_massdns.txt
















    #certspotter.sh





    #!/bin/bash
    #curl https://certspotter.com/api/v0/certs\?domain\=$1 | jq '.[].dns_names[]' | sed
    's/\"//g' | sed 's/\*\.//g' | uniq | dig +short -f - | uniq | nmap -T5 -Pn -sS -i - -p
    80,443,21,22,8080,8081,8443 --open -n -oG -
    #curl https://certspotter.com/api/v0/certs\?domain\=luminate.com | jq '.[].dns_names[]'
    | sed 's/\"//g' | sed 's/\*\.//g' | uniq | dig +short -f - | uniq | nmap -T5 -Pn -sS -i
    - -p 80,443,21,22,8080,8081,8443 --open -n -oG -
    curl https://certspotter.com/api/v0/certs\?domain\=$1 | jq '.[].dns_names[]' | sed
    's/\"//g' | sed 's/\*\.//g' | uniq





    ###AMASS



    #!/bin/bash
    mkdir $1
    touch $1/$1.txt
    amass -active -d $1 |tee /root/tools/amass/$1/$1.txt




    ###SubFinder


    !/bin/bash
    mkdir $1
    touch $1/$1.txt
    subfinder -d $1 |tee $1/$1.txt



    ####MASScan


    #!/bin/bash
    strip=$(echo $1|sed 's/https\?:\/\///')
    echo ""
    echo "##################################################"
    host $strip
    echo "##################################################"
    echo ""
    masscan -p1-65535 $(dig +short $strip|grep -oE "\b([0-9]{1,3}\.){3}[0-9]{1,3}\b"|head -1)
    --max-rate 1000 |& tee $strip_scan
    ██████╗ ███████╗ ██████╗ ██████╗ ███╗ ██╗
    ██╔══██╗██╔════╝██╔════╝██╔═══██╗████╗ ██║
    ██████╔╝█████╗ ██║ ██║ ██║██╔██╗ ██║
    ██╔══██╗██╔══╝ ██║ ██║ ██║██║╚██╗██║
    ██║ ██║███████╗╚██████╗╚██████╔╝██║ ╚████║
    ╚═╝ ╚═╝╚══════╝ ╚═════╝ ╚═════╝ ╚═╝ ╚═══╝

    @intx0x80

    1- Assest discover
    [+] subdomain
    https://github.com/anshumanbh/brutesubs
    https://michenriksen.com/blog/aquatone-now-in-go/
    https://github.com/mandatoryprogrammer/cloudflare_enum
    https://github.com/TheRook/subbrute
    https://github.com/blechschmidt/massdns
    https://gist.github.com/jhaddix/86a06c5dc309d08580a018c66354a056 (wordlist DNS)
    https://github.com/jhaddix/domain
    knockpy
    https://github.com/tomnomnom/assetfinder
    https://bgp.he.net
    CSP Headers [https://github.com/0xbharath/domains-from-csp]
    https://github.com/0xbharath/censys-enumeration
    https://github.com/appsecco/the-art-of-subdomain-enumeration
    https://github.com/appsecco/bugcrowd-levelup-subdomain-enumeration
    https://github.com/0xbharath/assets-from-spf
    https://github.com/0xbharath/cloudflare_enum
    massdns
    amass
    subfinder
    Altdns
    sublister
    crt.sh (%.site.com)
    www.yougetsignal.com
    [+] CERT
    censys [443.https.tls.certificate.parsed.extensions.subject_alt_name.dns_names:[site.com] ]
    google [https://transparencyreport.google.com/https/certificates?hl=en]
    facebook [https://developers.facebook.com/tools/ct]


    2-OSINT
    https://github.com/intrigueio/intrigue-core

    [+] ARIN
    https://whois.arin.net
    https://reverse.report/
    http://domainbigdata.com/
    http://viewdns.info/
    https://apps.db.ripe.net/db-web-ui/#/fulltextsearch
    http://bgp.he.net
    [+] Shodan [shodan.io]
    Ports: 8443, 8080, 8180, etc
    Title: “Dashboard [Jenkins]”
    Product:Tomcat
    Hostname: somecorp.com
    Org: evilcorp
    ssl: Google


    fofa.so
    [+] doc
    stroage.googleapis.com/site.com
    [+] Acquisitions
    https://www.crunchbase.com/search/acquisitions
    [+]get live domains [https://github.com/tomnomnom/httprobe]
    3-Vendor Services
    [+] Leak creeds
    https://apkscan.nviso.be
    gitrob
    git-all-secrets
    truffleHog
    git-secrets
    repo-supervisor
    [+]gitlab
    gitlab /explore
    [+] github dork
    https://github.com/0xbharath/github-dorks
    "company.com" "dev"
    "dev.company.com”
    "company.com" API_key
    "company.com" password
    "api.company.com" authorization
    APP_SECRET
    consumerkey
    JIRA_Password
    jdbc
    “authorization bearer”
    auth_key
    consumer_secret
    SECURITY-SIGNATURE
    X-API
    X-Paypal
    secret_key
    JWK/JWT
    SSO_LOGIN
    defaultEndpointsProtocol
    access_key
    accountKey
    AWS_Secret
    aws_secret_access_key
    rexis
    api_key





    3-Visual Identification
    eyewitness
    webscreenshot
    gowitness


    4-scanning
    [+]nmap
    nmap -sS -A -PN -p- --script=http-title site.com
    [+]common ports
    3868,3366,8443,8080,9443,9091,3000,8000,5900,8081,6000,10000,8181,3306,5000,4000,8888,5432,15672,9999,161,4044,7077,4040,9000,8089,443,7447,7080,8880,8983,5673,7443
    [+]masscan
    masscan -p1-65535 $(dig +short $1|grep -oE "\b([0-9]{1,3}\.){3}[0-9]{1,3}\b"|head - --max-rate 1000


    5-Platform Identification
    [*]Builtwith
    [*]Wappalyzer
    [*]Vulners Burp Plugin
    6-Content Discovery
    [*]Gobuster
    [*]dirbuster
    [*]dirsearch
    [*]wfuzz
    [*]meg [https://github.com/tomnomnom/meg]
    [*]waybackurls [https://github.com/tomnomnom/waybackurls]
    [+]SVN
    https://github.com/cure53/Flashbang
    [+]git
    https://github.com/arthaud/git-dumper.git
    https://github.com/michenriksen/gitrob

    7-Parameter discovery
    Parameth [https://github.com/maK-/parameth]
    Arjun [https://github.com/s0md3v/Arjun]


    8-scripts
    [+]phpinfo
    #!/bin/bash
    for ipa in 98.13{6..9}.{0..255}.{0..255}; do
    wget -t 1 -T 5 http://${ipa}/phpinfo.php; done&
    [+]certspotter
    curl https://certspotter.com/api/v0/certs\?domain\=$1 | jq '.[].dns_names[]' | sed 's/\"//g' | sed 's/\*\.//g' | uniq
    [+]crtsh
    curl -s https://crt.sh/?q=%.$1 | sed 's/<\/\?[^>]\+>//g' | grep $1

    for i in `cat list.txt`
    do
    curl -s https://crt.sh/?q=$i | sed 's/<\/\?[^>]\+>//g' |tee -a domain.txt
    done
    echo "[+] httprope"
    cat domain.txt|httprobe|tee -a live-domain.txt
    9-AWS SS3
    sandcastle [https://github.com/0xSearches/sandcastle]
    https://github.com/nahamsec/lazys3
    [+]dork
    site:s3.amazonaws.com inurl:site

    10-Dorks
    -site.com +inurl:dev -cdn
    - site:site.com -www.site.com -www.sanbox
    - site:target.com filetype:php
    - site:target.com filetype:aspx
    - site:target.com filetype:swf (Shockwave Flash)
    - site:target.com filetype:wsdl
    - site: target.com inurl:.php?id=
    - site: target.com inurl:.php?user=
    - site: target.com inurl:.php?book=
    - site: target.com inurl:login.php
    - site: target.com intext: “login”
    - site: target.com inurl:portal.php
    - site: target.com inurl:register.php
    - site: target.com intext: “index of /”
    - site: target.com filetype:txt
    - site: target.com inurl:.php.txt
    - site: target.com ext:txt
    - site:trello.com intext:ftp
    - site:trello.com intext:ORG
    - site:target.com filetype:php
    - site:target.com filetype:aspx
    - site:target.com filetype:swf (Shockwave Flash)
    - site:target.com filetype:wsdl
    - site:example.com -www [ Bing, DuckDuckGo, Yahoo]









    ███████╗███╗ ██╗██████╗
    ██╔════╝████╗ ██║██╔══██╗
    █████╗ ██╔██╗ ██║██║ ██║
    ██╔══╝ ██║╚██╗██║██║ ██║
    ███████╗██║ ╚████║██████╔╝
    ╚══════╝╚═╝ ╚═══╝╚═════╝

  5. @cyberheartmi9 cyberheartmi9 revised this gist May 11, 2019. 1 changed file with 80 additions and 0 deletions.
    80 changes: 80 additions & 0 deletions Bug Bounty methodology
    Original file line number Diff line number Diff line change
    @@ -188,3 +188,83 @@ idb tool (https://github.com/dmayer/idb)
    #!/bin/bash
    for ipa in 98.13{6..9}.{0..255}.{0..255}; do
    wget -t 1 -T 5 http://${ipa}/phpinfo.php; done&





    #Rundns

    #!/bin/bash

    ./subbrute.py all.txt $1|/bin/massdns -r resolvers.txt -t A -a -o -w $1_massdns.txt
















    #certspotter.sh





    #!/bin/bash
    #curl https://certspotter.com/api/v0/certs\?domain\=$1 | jq '.[].dns_names[]' | sed
    's/\"//g' | sed 's/\*\.//g' | uniq | dig +short -f - | uniq | nmap -T5 -Pn -sS -i - -p
    80,443,21,22,8080,8081,8443 --open -n -oG -
    #curl https://certspotter.com/api/v0/certs\?domain\=luminate.com | jq '.[].dns_names[]'
    | sed 's/\"//g' | sed 's/\*\.//g' | uniq | dig +short -f - | uniq | nmap -T5 -Pn -sS -i
    - -p 80,443,21,22,8080,8081,8443 --open -n -oG -
    curl https://certspotter.com/api/v0/certs\?domain\=$1 | jq '.[].dns_names[]' | sed
    's/\"//g' | sed 's/\*\.//g' | uniq





    ###AMASS



    #!/bin/bash
    mkdir $1
    touch $1/$1.txt
    amass -active -d $1 |tee /root/tools/amass/$1/$1.txt




    ###SubFinder


    !/bin/bash
    mkdir $1
    touch $1/$1.txt
    subfinder -d $1 |tee $1/$1.txt



    ####MASScan


    #!/bin/bash
    strip=$(echo $1|sed 's/https\?:\/\///')
    echo ""
    echo "##################################################"
    host $strip
    echo "##################################################"
    echo ""
    masscan -p1-65535 $(dig +short $strip|grep -oE "\b([0-9]{1,3}\.){3}[0-9]{1,3}\b"|head -1)
    --max-rate 1000 |& tee $strip_scan
  6. @cyberheartmi9 cyberheartmi9 revised this gist May 11, 2019. 1 changed file with 49 additions and 3 deletions.
    52 changes: 49 additions & 3 deletions Bug Bounty methodology
    Original file line number Diff line number Diff line change
    @@ -4,13 +4,15 @@
    @Identify IPs and main TLDs

    ASNs (http://bgp.he.net)
    Reverse Whois (https://whois.arin.net , https://reverse.report/ , http://domainbigdata.com/ , http://viewdns.info/ ,https://apps.db.ripe.net/db-web-ui/#/fulltextsearch)
    Reverse Whois (https://whois.arin.net (Target IP Range) , https://reverse.report/ , http://domainbigdata.com/ , http://viewdns.info/ ,https://apps.db.ripe.net/db-web-ui/#/fulltextsearch)
    Acquisitions (https://www.crunchbase.com/search/acquisitions)
    Trademarks
    Shodan (shodan.io)
    https://censys.io
    https://developers.facebook.com/tools/ct
    https://www.zoomeye.org/
    crt.sh (%.site.com)
    https://transparencyreport.google.com/https/certificates?hl=en
    https://github.com/anshumanbh/brutesubs
    https://github.com/mandatoryprogrammer/cloudflare_enum
    https://github.com/TheRook/subbrute
    @@ -24,12 +26,24 @@ https://builtwith.com
    https://github.com/blechschmidt/massdns
    https://github.com/sa7mon/S3Scanner

    #####Mobile

    https://apkscan.nviso.be


    ######## other side on same domain
    www.yougetsignal.com


    ##########################################
    https://github.com/nahamsec/bbht
    https://github.com/nahamsec/lazyrecon
    ##########################################
    github amazonaws.com uber

    ############## Find Subdomains of Subdomain ##################
    /subbrute.py target.com > sudomains.txt
    ./subbrute.py –t subdomains.txt



    @@ -49,11 +63,29 @@ sandcastle (https://github.com/0xSearches/sandcastle)
    https://github.com/nahamsec/lazys3


    #Dork:
    ###################Dork:
    site.com +inurl:dev -cdn

    site:apkscan.nviso.be site
    site:site.com -www.site.com -www.sanbox

    -site:target.com filetype:php
    - site:target.com filetype:aspx
    - site:target.com filetype:swf (Shockwave Flash)
    - site:target.com filetype:wsdl
    - site: target.com inurl:.php?id=
    - site: target.com inurl:.php?user=
    - site: target.com inurl:.php?book=
    - site: target.com inurl:login.php
    - site: target.com intext: “login”
    - site: target.com inurl:portal.php
    - site: target.com inurl:register.php
    -site: target.com intext: “index of /”
    -site: target.com filetype:txt
    - site: target.com inurl:.php.txt
    -site: target.com ext:txt
    CSP Headers
    fofa.so



    @Permutation scanning & Portscan
    @@ -84,6 +116,9 @@ Vulners Burp Plugin

    #Mapping

    https://github.com/zseano/InputScanner.git
    https://github.com/zseano/JS-Scan.git


    retire.js
    SVN
    @@ -142,3 +177,14 @@ https://github.com/arvinddoraiswamy/mywebappscripts/tree/master/ForceSSL
    idb tool (https://github.com/dmayer/idb)





    ######################################### SCRIPTS ####################################




    #!/bin/bash
    for ipa in 98.13{6..9}.{0..255}.{0..255}; do
    wget -t 1 -T 5 http://${ipa}/phpinfo.php; done&
  7. @cyberheartmi9 cyberheartmi9 created this gist May 8, 2019.
    144 changes: 144 additions & 0 deletions Bug Bounty methodology
    Original file line number Diff line number Diff line change
    @@ -0,0 +1,144 @@
    #find sub domain


    @Identify IPs and main TLDs

    ASNs (http://bgp.he.net)
    Reverse Whois (https://whois.arin.net , https://reverse.report/ , http://domainbigdata.com/ , http://viewdns.info/ ,https://apps.db.ripe.net/db-web-ui/#/fulltextsearch)
    Acquisitions (https://www.crunchbase.com/search/acquisitions)
    Trademarks
    Shodan (shodan.io)
    https://censys.io
    https://www.zoomeye.org/
    crt.sh (%.site.com)
    https://github.com/anshumanbh/brutesubs
    https://github.com/mandatoryprogrammer/cloudflare_enum
    https://github.com/TheRook/subbrute
    https://github.com/blechschmidt/massdns
    https://gist.github.com/jhaddix/86a06c5dc309d08580a018c66354a056 (wordlist DNS)
    https://github.com/jfrancois/SDBF
    sublister
    gobuster
    https://github.com/vysecurity/DomLink
    https://builtwith.com
    https://github.com/blechschmidt/massdns
    https://github.com/sa7mon/S3Scanner

    ##########################################
    https://github.com/nahamsec/bbht
    https://github.com/nahamsec/lazyrecon
    ##########################################
    github amazonaws.com uber




    ###########Leak ##############################################

    gitrob
    git-all-secrets
    truffleHog
    git-secrets
    repo-supervisor



    #AWS SS3
    site:s3.amazonaws.com inurl:site
    sandcastle (https://github.com/0xSearches/sandcastle)
    https://github.com/nahamsec/lazys3


    #Dork:
    site.com +inurl:dev -cdn

    site:site.com -www.site.com -www.sanbox



    @Permutation scanning & Portscan
    nmap -sS -A -PN -p- --script=http-title site.com

    Altdns
    Sdbf
    nmap
    masscan


    @Visual Identification
    eyewitness

    @AUXiliary

    spider
    Github

    @Platform Identification


    Builtwith
    Wappalyzer
    Vulners Burp Plugin

    @Content Discovery

    #Mapping


    retire.js
    SVN
    git (https://github.com/arthaud/git-dumper.git , https://github.com/michenriksen/gitrob )
    RAFT lists
    Wapplyzer
    Xssed.com
    intrigue (https://github.com/intrigueio/intrigue-core)
    https://github.com/cure53/Flashbang



    Gobuster
    Wordlists
    Burp

    @Parameter discovery
    https://github.com/s0md3v/Arjun
    Parameth
    Burp analyze target
    https://github.com/epinna/tplmap.git


    https://github.com/jhaddix/domain


    #Port scanner:








    #Testing


    #WAF

    tip
    ww1,ww2,ww3, ... site.com
    x.sub.y.com
    x-sub.y.com


    #SQL

    SLEEP(1) /*‘ or SLEEP(1) or ‘“ or SLEEP(1) or “*/

    #SSL
    https://github.com/arvinddoraiswamy/mywebappscripts/tree/master/ForceSSL

    #IOS

    idb tool (https://github.com/dmayer/idb)