Skip to content

Instantly share code, notes, and snippets.

View 0x3n0's full-sized avatar
🎯
Focusing

Eno Leriand 0x3n0

🎯
Focusing
View GitHub Profile
@0x3n0
0x3n0 / recon.md
Last active August 12, 2025 23:33

GitHub Actions: Recon & Takeover

🎯 Goal

This workflow performs automated recon and subdomain takeover checks every time there's a push to the main branch. All results are stored in the results/ directory and automatically committed back to the repo.


πŸ§ͺ Trigger

Overview

CVE-2025-32463 is a critical local privilege escalation vulnerability in the Sudo utility, affecting versions 1.9.14 to 1.9.17. With a CVSS score of 9.3, this flaw allows an unprivileged local user to execute arbitrary code as root by exploiting improper path resolution in Sudo’s --chroot (-R) option. Discovered by Qualys’ Threat Research Unit, the vulnerability stems from Sudo’s handling of the /etc/nsswitch.conf file within a user-controlled chroot environment, enabling the loading of a malicious shared library. This analysis details the vulnerability’s mechanics, exploitation process, impact, and mitigation strategies.

Technical Details

Affected Component

  • Software: Sudo (System Utility for Delegating Authority)
  • Versions: 1.9.14 to 1.9.17 (patched in 1.9.17p1)
  • Platforms: Linux systems using /etc/nsswitch.conf (e.g., Ubuntu, Debian, SUSE, Red Hat)
  • Introduced: The --chroot option, added in Sudo 1.9.14 to enhance containerized environment support
package main

import (
  "encoding/json"
  "flag"
  "fmt"
  "io/ioutil"
  "net/http"
  "os"
@0x3n0
0x3n0 / dom.md
Last active April 16, 2025 06:38
(function () {
  const suspiciousSources = [
    'location',
    'location.href',
    'location.search',
    'document.URL',
    'document.documentURI',
    'document.referrer'
  ];
(async function () {
    const delay = ms => new Promise(resolve => setTimeout(resolve, ms));
    const clickMuteButton = async () => {
        const replies = document.querySelectorAll('[data-testid="tweet"]');
        for (const reply of replies) {
            const blueCheck = reply.querySelector('svg[aria-label="Verified account"]');
            if (blueCheck) {
                const moreOptionsButton = reply.querySelector('[aria-label="More"]');
                if (moreOptionsButton) {

Website Crawler for Clickjacking Detection Using X-Frame-Options and CSP

This script is a Go-based website crawler designed to detect potential vulnerabilities to clickjacking attacks. It works by examining HTTP headers such as X-Frame-Options and Content-Security-Policy.

Features:

  • Crawling Capability: Recursively scans all reachable URLs within the same domain starting from the base URL.
  • Header Analysis:
    • Detects the presence and values of the X-Frame-Options header.
    • Parses Content-Security-Policy directives for frame-ancestors to evaluate iframe embedding restrictions.
  • Vulnerability Classification:
    • Protected: URLs with sufficient protections (X-Frame-Options or CSP frame-ancestors).
const startDate = new Date('2022-01-01');
const endDate = new Date('2023-01-01');
const waitForElemToExist = async (selector, timeout = 5000) => {
return new Promise((resolve) => {
const element = document.querySelector(selector);
if (element) return resolve(element);
const observer = new MutationObserver(() => {
const element = document.querySelector(selector);
@0x3n0
0x3n0 / Penetration Testing Report.md
Last active August 18, 2024 10:12
This Gist contains a detailed penetration testing report for the system with IP address 192.168.8.4. The report outlines the scope of the test, methodologies used, key findings, vulnerabilities discovered, and actionable recommendations to enhance the security of the target system. Prepared by Eno Leriand on August 13, 2024.

Penetration Testing Report for Target System 192.168.8.4 - August 2024

Date: August 13, 2024
Pentester: Eno Leriand


Table of Contents

  1. Report Overview
#!/bin/bash

# Variables
HOSTAPD_CONF="/tmp/evil_twin/hostapd.conf"
DNSMASQ_CONF="/tmp/evil_twin/dnsmasq.conf"
PHISHING_PAGE_DIR="/tmp/evil_twin/www"
PHISHING_PAGE="$PHISHING_PAGE_DIR/index.html"
CAPTURE_FILE="/tmp/evil_twin/capture.txt"
HOTSPOT_IP="192.168.20.1"
@0x3n0
0x3n0 / battry
Last active December 27, 2023 13:48
#!/bin/bash
battery_status=$(acpi | awk '{print $3}')
battery_percentage=$(acpi | awk '{print $4}' | sed 's/,//')
if [ "$battery_status" == "Discharging," ]; then
icon="πŸ”‹"
else
icon="πŸ”Œ"