Skip to content

Instantly share code, notes, and snippets.

@z0rs
z0rs / Delete.js
Last active September 1, 2024 16:01
const deleteTweetsBetweenDates = async (startDate, endDate) => {
const processedButtons = new Set();
const delay = (ms) => new Promise(resolve => setTimeout(resolve, ms));
console.log("Script started");
while (true) {
console.log("Looking for tweets...");
const deleteButtons = Array.from(document.querySelectorAll('[data-testid="caret"]'))

Dalam kasus ini, interface yang aktif adalah wlp2s0 dengan IP 192.168.8.2(ip addr) dan gateway 192.168.8.1 (ip route show).

Step 1: Install Tools

Pastikan arpspoof, sslsplit, dan dsniff. Ini biasanya tersedia di Arch Linux.

sudo pacman -S dsniff sslsplit

Step 2: ARP Spoofing

#!/bin/bash

# Variables
HOSTAPD_CONF="/etc/hostapd/hostapd.conf"
DNSMASQ_CONF="/etc/dnsmasq.conf"
HOTSPOT_IP="192.168.20.1"
DHCP_RANGE_START="192.168.20.10"
DHCP_RANGE_END="192.168.20.50"

3. Man-in-the-Middle (MITM) Attack

Tools: ettercap, mitmproxy, Wireshark

Langkah-langkah:

A. ARP Spoofing dengan Ettercap

  1. Install Ettercap:
    sudo apt-get install ettercap-graphical
cloudamqp.com
cloudkarafka.com
elephantsql.com
cloudmqtt.com
aax.com
achmea.nl
syntrus.com
woonfonds.nl
fbto.nl
averoachmea.nl

This Bash gist is a nifty command to find WordPress domains from a bug bounty program list provided by Project Discovery. First, it uses curl to fetch the bug bounty program list from a GitHub repository. Then, it utilizes jq to select domains from programs that have a bounty, followed by sorting to ensure uniqueness. After that, it employs httpx to test if these domains are running WordPress. Finally, the output is filtered and saved into the host-wordpress file. The second version of this command also removes https, http, www, and other characters from the URLs, providing cleaner results. Pretty cool, right?

curl -s "https://raw.githubusercontent.com/projectdiscovery/public-bugbounty-programs/master/chaos-bugbounty-list.json" | jq -r '.programs[] | select(.bounty==true) | .domains[]' | sort -u | httpx -td -ms WordPress | sed -e 's/\s.*$//' | tee host-wordpress

For sort unique

curl -s "https://raw.githubusercontent.com/projectdiscovery/public-bugbounty-programs/master/chaos-bugbo
name: Recon

on:
  push:
    branches: [master]

jobs:
  scan-and-deploy:
    runs-on: ubuntu-latest
#!/bin/bash
## this tool to take parameters that have '=' and add 'FUZZ' at the end of '=' the ultimate goal of this tool is to perform fuzzing and checking of vulnerable parameters
domain=$1
url="https://web.archive.org/cdx/search/cdx?url=*."$domain"/*&output=txt&fl=original&collapse=urlkey&page=/"

if [[ -z "$domain" ]]; then
    echo "Include the domain as an argument"
    exit 1
fi