Skip to content

Instantly share code, notes, and snippets.

View heckintosh's full-sized avatar
🏠
Working from home

Duc Anh Nguyen heckintosh

🏠
Working from home
View GitHub Profile
<!DOCTYPE html>
<!--[if lt IE 7]> <html class="no-js lt-ie9 lt-ie8 lt-ie7"> <![endif]-->
<!--[if IE 7]> <html class="no-js lt-ie9 lt-ie8"> <![endif]-->
<!--[if IE 8]> <html class="no-js lt-ie9"> <![endif]-->
<!--[if gt IE 8]> <html class="no-js"> <!--<![endif]-->
<html>
<head>
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<title></title>
@heckintosh
heckintosh / test.json
Last active October 6, 2025 12:13
test.json
{
"url": "https://gist.github.com/heckintosh/ac675ffdfcc752b9bb7c15af14b4e600/raw/df8aaae01e5c2cf12c602537cec2bdde96329dfb/test.yaml",
"urls": [
{
"url": "https://gist.github.com/heckintosh/ac675ffdfcc752b9bb7c15af14b4e600/raw/df8aaae01e5c2cf12c602537cec2bdde96329dfb/test.yaml",
"name": "Test"
}
]
}
@heckintosh
heckintosh / test.yaml
Last active October 6, 2025 12:11
test.yaml
swagger: '2.0'
info:
title: Classic API Resource Documentation
description: |
<foreignobject>test</foreignobject>
version: production
basePath: /JSSResource/
produces:
- application/xml

GitHub Search Syntax for Finding API Keys/Secrets/Tokens

As a security professional, it is important to conduct a thorough reconnaissance. With the increasing use of APIs nowadays, it has become paramount to keep access tokens and other API-related secrets secure in order to prevent leaks. However, despite technological advances, human error remains a factor, and many developers still unknowingly hardcode their API secrets into source code and commit them to public repositories. GitHub, being a widely popular platform for public code repositories, may inadvertently host such leaked secrets. To help identify these vulnerabilities, I have created a comprehensive search list using powerful search syntax that enables the search of thousands of leaked keys and secrets in a single search.

Search Syntax:

(path:*.{File_extension1} OR path:*.{File_extension-N}) AND ({Keyname1} OR {Keyname-N}) AND (({Signature/pattern1} OR {Signature/pattern-N}) AND ({PlatformTag1} OR {PlatformTag-N}))

Examples:

**1.

@heckintosh
heckintosh / PatchExtract.ps1
Created March 6, 2025 09:34 — forked from wumb0/PatchExtract.ps1
extract microsoft MSU files
<#
____ _ _
| _ \ __ _| |_ ___| |__
| |_) / _` | __/ __| '_ \
| __/ (_| | || (__| | | |
|_| \__,_|\__\___|_| |_|
_____ _ _
| ____|_ _| |_ _ __ __ _ ___| |_
| _| \ \/ / __| '__/ _` |/ __| __|
@heckintosh
heckintosh / PatchExtract125.ps1
Created March 2, 2025 09:16 — forked from moshekaplan/PatchExtract125.ps1
Patch Extract v1.25 by Greg Linares (@Laughing_Mantis)
<#
================
PATCHEXTRACT.PS1
=================
Version 1.25 Microsoft MSU Patch Extraction and Patch Organization Utility by Greg Linares (@Laughing_Mantis)
This Powershell script will extract a Microsoft MSU update file and then organize the output of extracted files and folders.
Organization of the output files is based on the patch's files and will organize them based on their archicture (x86, x64, or wow64)
as well as their content-type, ie: resource and catalog files will be moved to a JUNK subfolder and patch binaries and index files will
@heckintosh
heckintosh / bambda-user-agent-diff.java
Last active June 18, 2024 09:07
bambda filter based on user-agent
var header = requestResponse().request().headerValue("User-Agent");
if (header == "MAIN_ACCOUNT"){
requestResponse.annotations().setHighlightColor(HighlightColor.GREEN);
requestResponse.annotations().setNotes("MAIN_ACCOUNT");}
else if (header == "2ND_ACCOUNT"){
requestResponse.annotations().setHighlightColor(HighlightColor.GREEN);
requestResponse.annotations().setNotes("2ND_ACCOUNT");
}
@heckintosh
heckintosh / exp.py
Created November 16, 2023 08:19 — forked from kungfulon/exp.py
BlackHat MEA 2023 - House of Minho
from pwn import *
context.update(os='linux', arch='amd64')
r = process('./minho')
l = ELF('/lib/x86_64-linux-gnu/libc.so.6')
def new(size, data, abuse_scanf=0):
r.sendlineafter(b'> ', b'1')
r.sendlineafter(b': ', b'0' * abuse_scanf + str(size).encode())
#EXTM3U
#EXTINF:-1,MTV
http://42.117.13.32:4022/udp/225.1.1.245:30120
#EXTINF:-1,Animal Planet
http://42.117.13.32:4022/udp/225.1.1.231:30120
#EXTINF:-1,Arirang
http://42.117.13.32:4022/udp/225.1.1.201:30120
#EXTINF:-1,Asian Food Channel HD
http://42.117.13.32:4022/udp/225.1.1.198:30120
#EXTINF:-1,Asian Food Channel HD
# All scripts
```
--tamper=apostrophemask,apostrophenullencode,appendnullbyte,base64encode,between,bluecoat,chardoubleencode,charencode,charunicodeencode,concat2concatws,equaltolike,greatest,halfversionedmorekeywords,ifnull2ifisnull,modsecurityversioned,modsecurityzeroversioned,multiplespaces,nonrecursivereplacement,percentage,randomcase,randomcomments,securesphere,space2comment,space2dash,space2hash,space2morehash,space2mssqlblank,space2mssqlhash,space2mysqlblank,space2mysqldash,space2plus,space2randomblank,sp_password,unionalltounion,unmagicquotes,versionedkeywords,versionedmorekeywords
```
# General scripts
```
--tamper=apostrophemask,apostrophenullencode,base64encode,between,chardoubleencode,charencode,charunicodeencode,equaltolike,greatest,ifnull2ifisnull,multiplespaces,nonrecursivereplacement,percentage,randomcase,securesphere,space2comment,space2plus,space2randomblank,unionalltounion,unmagicquotes
```
# Microsoft access
```