-
- #iot
- #chrome-and-friends: Chrome, V8, Blink, Mojo, etc.
- Linux kernel #todo
- expdev #todo
- fuzzing #todo
The criteria I used to rank:
Top candidates
Some notes and tools for reverse engineering / deobfuscating / unminifying obfuscated web app code.
Security Advisories / Bulletins / vendors Responses linked to Log4Shell (CVE-2021-44228)
| #!/bin/bash | |
| ##### | |
| # | |
| # St8out - Extra one-liner for reconnaissance | |
| # | |
| # Usage: ./st8out.sh target.com | |
| # | |
| # Resources: | |
| # - https://github.com/j3ssie/metabigor |
| ```zshrc | |
| #▄███████▄ ▄████████ ▄█ █▄ ▄████████ ▄████████ | |
| #██▀ ▄██ ███ ███ ███ ███ ███ ███ ███ ███ | |
| # ▄███▀ ███ █▀ ███ ███ ███ ███ ███ █▀ | |
| #▀█▀▄███▀▄▄ ███ ▄███▄▄▄▄███▄▄ ▄███▄▄▄▄██▀ ███ | |
| # ▄███▀ ▀ ▀███████████ ▀▀███▀▀▀▀███▀ ▀▀███▀▀▀▀▀ ███ | |
| #▄███▀ ███ ███ ███ ▀███████████ ███ █▄ | |
| #███▄ ▄█ ▄█ ███ ███ ███ ███ ███ ███ ███ | |
| #▀████████▀ ▄████████▀ ███ █▀ ███ ███ ████████▀ | |
| # ███ ███ |
[ SecHackLabs ~/Projects/Rust/Development/findomain ] [develop]
└─ ▶ time ./target/release/findomain -t aol.com --query-database -i --threads 100
Target ==> aol.com
Searching subdomains in the Findomain database for the target aol.com 🔍
Performing asynchronous subdomains resolution for 70600 subdomains with 100 threads, it will take a while. 🧐| /.s3cfg | |
| /phpunit.xml | |
| /nginx.conf | |
| /.vimrc | |
| /LICENSE.md | |
| /yarn.lock | |
| /Gulpfile | |
| /Gulpfile.js | |
| /composer.json | |
| /.npmignore |
| { | |
| "flags": "-HnriE", | |
| "patterns": [ | |
| "(xox[p|b|o|a]-[0-9]{12}-[0-9]{12}-[0-9]{12}-[a-z0-9]{32})", | |
| "-----BEGIN RSA PRIVATE KEY-----", | |
| "-----BEGIN DSA PRIVATE KEY-----", | |
| "-----BEGIN EC PRIVATE KEY-----", | |
| "-----BEGIN PGP PRIVATE KEY BLOCK-----", | |
| "AKIA[0-9A-Z]{16}", | |
| "amzn\\.mws\\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}", |