Skip to content

Instantly share code, notes, and snippets.

@SaicharanKandukuri
SaicharanKandukuri / nethunter.sh
Last active February 20, 2024 22:37
modified nethunter rootless script | based on proot-distro
#!/data/data/com.termux/files/usr/bin/bash -e
cd "${HOME}"
## termux-exec sets LD_PRELOAD so let's unset it before continuing
unset LD_PRELOAD
## Workaround for Libreoffice, also needs to bind a fake /proc/version
## Default user is "kali"
user="kali"
home="/home/$user"
start="sudo -u kali /bin/bash"
@SaicharanKandukuri
SaicharanKandukuri / Booting a rootfs_zip in a ubuntu_debian machine.md
Last active January 7, 2022 01:19
A way to boot tarballed Linux with systemd

This process requires Superuser privilages.

Step-1: Installing requirements:

we need systmd-nspawn application for doing this whole process. so we need to install it first. This pacakge is name as systemd-container in most of the linux distributions and system-nspwan in some distributions

sudo apt install -y systemd-container

if this dosent work the try this

sudo apt install -y systemd-nspawn
@SaicharanKandukuri
SaicharanKandukuri / CAP_LAST_CAP dbus in termux.bash
Last active April 25, 2023 12:39
way to run dbus inside termux | A way to run Gnome in termux with root
# https://elixir.bootlin.com/linux/v4.3/ident/CAP_LAST_CAP
# first creating a file with 0 inside file
echo 0 > ~/cap_last_cap
# Next step is to bind the file cap_last_cap to /proc/sys/kernel/cap_last_cap
#for proot-distro with ubuntu-18.04 the command looks like
proot-distro login ubuntu-18.04 --bind cap_last_cap:/proc/sys/kernel/cap_last_cap
@An0nYm0u5101
An0nYm0u5101 / google-dorks
Created May 18, 2020 17:56 — forked from stevenswafford/google-dorks
Listing of a number of useful Google dorks.
" _ _ "
" _ /|| . . ||\ _ "
" ( } \||D ' ' ' C||/ { % "
" | /\__,=_[_] ' . . ' [_]_=,__/\ |"
" |_\_ |----| |----| _/_|"
" | |/ | | | | \| |"
" | /_ | | | | _\ |"
It is all fun and games until someone gets hacked!
Getting Started
Https://wizardforcel.gitbooks.io/web-hacking-101/content/ Web Hacking 101 Chinese
Https://wizardforcel.gitbooks.io/asani/content/ Easy to get Android security Chinese version
Https://wizardforcel.gitbooks.io/lpad/content/ Android penetration test study manual Chinese version
Https://wizardforcel.gitbooks.io/kali-linux-web-pentest-cookbook/content/ Kali Linux Web Penetration Test Cheats Chinese Version
Https://github.com/hardenedlinux/linux-exploit-development-tutorial Linux exploit Development Primer
Https://www.gitbook.com/book/t0data/burpsuite/details burpsuite actual guide
Http://www.kanxue.com/?article-read-1108.htm=&winzoom=1 Penetration Testing Node.js Application
Https://github.com/qazbnm456/awesome-web-security Web Security Information and Resources List
We can't make this file beautiful and searchable because it's too large.
google.com,Alexa
microsoft.com,Alexa
www.google.com,Alexa
safebrowsing.googleapis.com,Alexa
facebook.com,Alexa
doubleclick.net,Alexa
g.doubleclick.net,Alexa
clients4.google.com,Alexa
windowsupdate.com,Alexa
ctldl.windowsupdate.com,Alexa
The credit/debit card number is referred to as a PAN, or Primary Account Number. The first six digits of the PAN are taken from the IIN, or Issuer Identification Number, belonging to the issuing bank (IINs were previously known as BIN — Bank Identification Numbers — so you may see references to that terminology in some documents). These six digits are subject to an international standard, ISO/IEC 7812, and can be used to determine the type of card from the number.
Unfortunately the actual ISO/IEC 7812 database is not publicly available, however there are unofficial lists, both commercial and free, including on Wikipedia.
Anyway, to detect the type from the number, you can use a regular expression like the ones below: Credit for original expressions
Visa: ^4[0-9]{6,}$ Visa card numbers start with a 4.
MasterCard: ^5[1-5][0-9]{5,}$ MasterCard numbers start with the numbers 51 through 55, but this will only detect MasterCard credit cards; there are other cards issued using the MasterCard system that do not f
###SSH into a remote machine###
#domain name
ssh [email protected]
#ip address
ssh [email protected]
__exit:__ `exit`
@stevenswafford
stevenswafford / google-dorks
Created June 6, 2015 05:57
Listing of a number of useful Google dorks.
" _ _ "
" _ /|| . . ||\ _ "
" ( } \||D ' ' ' C||/ { % "
" | /\__,=_[_] ' . . ' [_]_=,__/\ |"
" |_\_ |----| |----| _/_|"
" | |/ | | | | \| |"
" | /_ | | | | _\ |"
It is all fun and games until someone gets hacked!
@organman91
organman91 / pass_easy_setup.sh
Last active September 24, 2020 09:06
pass easy setup
#Install pass and its dependencies: http://www.passwordstore.org/#download
#Generate a gpg key if you don't have one already.
gpg --gen-key
#Create a git (or mercurial) repository. Needless to say, you should NOT be checking this repo in to a system you don't control.
#Make two directories within it:
mkdir /path/to/repo/pubkeys /path/to/repo/store
#Set the PASSWORD_STORE_DIR environment variable to the store directory:
export PASSWORD_STORE_DIR="/path/to/repo/store"