├── AWS.md ├── ApiKey.md ├── Buffer-Overflow.md ├── CRLF.md ├── CV ├── GochaOkradzeCV.pdf └── GochaOkradze_CV_EN.pdf ├── Cors-Origin.md ├── Crawl_Parameters.md ├── EndpointsExtractor.md ├── ErrorsAndVulnsDetect.md ├── Georgian-Recon.md ├── Gospider.md ├── IP_regex.md ├── Img ├── Screenshot from 2019-05-10 02-25-10.png ├── Screenshot from 2019-05-10 02-40-35.png ├── Screenshot from 2019-05-10 09-56-26.png ├── Screenshot from 2019-05-10 10-08-11.png └── empty.md ├── LFI.md ├── MyBugBountyMethodology.md ├── OpenRedirect_SSRF.md ├── RCE.md ├── README.md ├── ReconWithBurp_Suite.md ├── SQLiError.md ├── Secret_Patterns_db.MD ├── SubRegex.md ├── SubdomainsToBurp.md ├── Time-Based-SQLi.md ├── WEB APPLICATION PENTESTING CHECKLIST.pdf ├── WebDAV.md ├── bxss_js.md ├── content_discovery.md ├── file_upload.md ├── htmlattribs ├── paramName-inputTag.md ├── translate └── wahh-yandex-translate-ru.pdf ├── web ports.md ├── wordlists ├── 1.json ├── 2.json ├── README.md ├── b.json ├── blind-time-based-sqli-payloads.txt ├── common_api_paths.txt ├── content.txt ├── lfi-linux.txt ├── parameters.txt ├── s0md3v_XSS.txt ├── sensitive.txt ├── ssrf.txt ├── swagger.json ├── testSwagger │ ├── 06.json │ ├── c.json │ ├── j.json │ ├── q.json │ ├── t.json │ ├── w.json │ └── y.json └── xssAttacks.json ├── xpath.md ├── xss from img for S3 bucket.md ├── xss.md └── xxe.md /AWS.md: -------------------------------------------------------------------------------- 1 | # AWS 2 | Search AWS urls,keys in response body 3 | ### Regex 4 | 5 | AMAZON_URL: ```https?://[^\"\\'> ]``` 6 | 7 | AMAZON_URL_1: ```[a-z0-9.-]+\.s3-[a-z0-9-]\\.amazonaws\.com``` 8 | 9 | AMAZON_URL_2: ```[a-z0-9.-]+\.s3-website[.-](eu|ap|us|ca|sa|cn)``` 10 | 11 | AMAZON_URL_3: ```s3\\.amazonaws\.com/[a-z0-9._-]``` 12 | 13 | AMAZON_URL_4: ```s3-[a-z0-9-]+\.amazonaws\\.com/[a-z0-9._-]``` 14 | 15 | URLS: ```https?://[^\"\\'> ]``` 16 | 17 | AMAZON_KEY: ```([^A-Z0-9]|^)(AKIA|A3T|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{12,}``` 18 | 19 | UPLOAD_FIELDS: ```]\stype=[\"']?file[\"']?``` 20 | 21 | 22 | ### Scan for s3 bucket takeover vuln 23 | 24 | #### what you need 25 | * golang 26 | * subfinder or other subdomain collector tool: ```https://github.com/projectdiscovery/subfinder``` 27 | * gospider: ```https://github.com/jaeles-project/gospider``` 28 | * httpx: ```https://github.com/projectdiscovery/httpx``` 29 | * Oneliner terminal command 30 | 31 | ``` 32 | subfinder -d hackerone.com -silent | httpx -silent | gospider -d 5 --sitemap --robots -w -r --subs | grep "\[aws-s3" | sed 's/\[aws-s3\] - //g' | httpx -silent -mr "NoSuchBucket" | tee s3-bucket-takeover.txt 33 | ``` 34 | -------------------------------------------------------------------------------- /ApiKey.md: -------------------------------------------------------------------------------- 1 | # Api Key 2 | Detect Api key in request | response body 3 | 4 | How to use api key: https://github.com/streaak/keyhacks 5 | 6 | 7 | ### Keys: 8 | ATOMIST_API_KEY : ```\b[A-F0-9]{64}\b/``` 9 | 10 | TWITTER_ACCESS_TOKEN : ```[1-9][0-9]+-[0-9a-zA-Z]{40}``` 11 | 12 | FACEBOOK_ACCESS_TOKEN : ```EAACEdEose0cBA[0-9A-Za-z]+``` 13 | 14 | GOOGLE_API_KEY: ```AIza[0-9A-Za-z\-_]{35}``` 15 | 16 | GOOGLE_OAUTH_ID : ```[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com/``` 17 | 18 | PICATIC_API_KEY : ```sk_live_[0-9a-z]{32}``` 19 | 20 | STRIPE_REGULAR_API_KEY : ```sk_live_[0-9a-zA-Z]{24}``` 21 | 22 | STRIPE_RESTRICTED_API_KEY: ```rk_live_[0-9a-zA-Z]{24}``` 23 | 24 | SQUARE_OAUTH_TOKEN: ```sq0atp-[0-9A-Za-z\-_]{22}``` 25 | 26 | SQUARE_OAUTH_SECRET: ```sq0csp-[0-9A-Za-z\-_]{43}``` 27 | 28 | BRAINTREE_ACCESS_TOKEN: ```access_token\$production\$[0-9a-z]{16}\$[0-9a-f]{32}``` 29 | 30 | AMAZON_AUTH_TOKEN: ```amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}``` 31 | 32 | TWILLIO_API_KEY: ```SK[0-9a-fA-F]{32}``` 33 | 34 | MAILGUN_KEY: ```key-[0-9a-zA-Z]{32}``` 35 | 36 | MAILCHIMP_API_KEY: ```[0-9a-f]{32}-us[0-9]{1,2}``` 37 | 38 | AMAZON_ACCESS_KEY: ```\bAK[0-9A-Z]{18}\b``` 39 | 40 | GITHUB_TOKEN: ```(https?:\/\/)(?:v1\.)?[a-f0-9]{40}((?::x-oauth-basic)?@)``` 41 | 42 | URL_PASSWORD: ```((?:ht|f|sm)tps?:\/\/[^:/?#\[\]@""<>{}|\\^``\s]+:)[^:/?#\[\]@""<>{}|\\^``\s]+@``` 43 | 44 | slack_token: ```(xox[p|b|o|a]-[0-9]{12}-[0-9]{12}-[0-9]{12}-[a-z0-9]{32})``` 45 | 46 | slack_webhook: ```https://hooks.slack.com/services/T[a-zA-Z0-9_]{8}/B[a-zA-Z0-9_]{8}/[a-zA-Z0-9_]{24}``` 47 | 48 | facebook_oauth: ```[f|F][a|A][c|C][e|E][b|B][o|O][o|O][k|K].{0,30}['\"\s][0-9a-f]{32}['\"\s]``` 49 | 50 | twitter_oauth: ```[t|T][w|W][i|I][t|T][t|T][e|E][r|R].{0,30}['\"\s][0-9a-zA-Z]{35,44}['\"\s]``` 51 | 52 | heroku_api: ```[h|H][e|E][r|R][o|O][k|K][u|U].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}``` 53 | 54 | google_captcha: ```6L[0-9A-Za-z-_]{38}``` 55 | 56 | google_oauth: ```ya29\.[0-9A-Za-z\-_]+``` 57 | 58 | 59 | 60 | 61 | #### Burp regexp 62 | 63 | ``` 64 | [0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com|[0-9a-f]{32}-us[0-9]{1,2}|[1-9][0-9]+-[0-9a-zA-Z]{40}|6L[0-9A-Za-z-_]{38}|AC[a-zA-Z0-9_\-]{32}|access_token\$production\$[0-9a-z]{16}\$[0-9a-f]{32}|AIza[0-9A-Za-z-_]{35}|AIza[0-9A-Za-z\-_]{35}|AKIA[0-9A-Z]{16}|amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}|AP[a-zA-Z0-9_\-]{32}|api[key|\s*]+[a-zA-Z0-9_\-]+|[a-zA-Z0-9_-]*:[a-zA-Z0-9_\-]+@github\.com*|\b[A-F0-9]{64}\b|\bAK[0-9A-Z]{18}\b|basic [a-zA-Z0-9_\-:\.]+|bearer [a-zA-Z0-9_\-\.]+|-----BEGIN PRIVATE KEY-----[a-zA-Z0-9\S]{100,}-----END PRIVATE KEY-----|-----BEGIN RSA PRIVATE KEY-----[a-zA-Z0-9\S]{100,}-----END RSA PRIVATE KEY-----|EAACEdEose0cBA[0-9A-Za-z]+|eyJ[a-zA-Z0-9]{10,}\.eyJ[a-zA-Z0-9]{10,}\.[a-zA-Z0-9_-]{10,}|[f|F][a|A][c|C][e|E][b|B][o|O][o|O][k|K].{0,30}['\"\s][0-9a-f]{32}['\"\s]|[h|H][e|E][r|R][o|O][k|K][u|U].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}|((?:ht|f|sm)tps?:\/\/[^:/?#\[\]@""<>{}|\\^``\s]+:)[^:/?#\[\]@""<>{}|\\^``\s]+@|https://hooks.slack.com/services/T[a-zA-Z0-9_]{8}/B[a-zA-Z0-9_]{8}/[a-zA-Z0-9_]{24}|(https?:\/\/)(?:v1\.)?[a-f0-9]{40}((?::x-oauth-basic)?@)|key-[0-9a-zA-Z]{32}|rk_live_[0-9a-zA-Z]{24}|s3\.amazonaws.com[/]+|[a-zA-Z0-9_-]*\.s3\.amazonaws.com|SK[0-9a-fA-F]{32}|sk_live_[0-9a-z]{32}|sk_live_[0-9a-zA-Z]{24}|sq0atp-[0-9A-Za-z\-_]{22}|sq0csp-[ 0-9A-Za-z\-_]{43}|sq0csp-[0-9A-Za-z\-_]{43}|sqOatp-[0-9A-Za-z\-_]{22}|[t|T][w|W][i|I][t|T][t|T][e|E][r|R].{0,30}['\"\s][0-9a-zA-Z]{35,44}['\"\s]|(xox[p|b|o|a]-[0-9]{12}-[0-9]{12}-[0-9]{12}-[a-z0-9]{32})|ya29\.[0-9A-Za-z\-_]+ 65 | ``` 66 | -------------------------------------------------------------------------------- /Buffer-Overflow.md: -------------------------------------------------------------------------------- 1 | # Buffer Overflow 2 | Users have to know that detecting a buffer overflow vulnerability will be only possible if the server is configured to return errors, and the application is developed in cgi-c or some other language that allows the programmer to do their own memory management. 3 | 4 | #TODO: if lengths = ```[ 65 , 257 , 513 , 1025, 2049, 4097, 8000 ]``` then I get a BadStatusLine exception from urllib2, is seems to be an internal error. Tested against tomcat 5.5.7 5 | 6 | ### Payload 7 | Build Payloads 8 | Example: ```['A' * payload_len for payload_len in [65, 257, 513, 1025, 2049]]``` 9 | 10 | ### Errors 11 | ##### Regexp: 12 | ``` 13 | stack smashing detected |Backtrace|Memory map 14 | ``` 15 | 16 | ``` 17 | # Note that the lack of commas after the strings is intentional 18 |
19 |The server encountered an internal error or 42 | misconfiguration and was unable to complete 43 | your request.
44 |Please contact the server administrator, 45 | webmaster@localhost and inform them of the time the error 46 | occurred, 47 | and anything you might have done that may have 48 | caused the error.
49 |More information about this error may be available 50 | in the server error log.
51 |msxml4\.dll<\/font>|
msxml3\.dll<\/font>|4005 Notes error: Query is not understandable|SimpleXMLElement::xpath|xmlXPathEval:|simplexml_load_string|parser error :|An error occured!|xmlParseEntityDecl|simplexml_load_string|xmlParseInternalSubset|DOCTYPE improperly terminated|Start tag expected|No declaration for attribute|No declaration for element|failed to load external entity|Start tag expected|Invalid URI: file:\/\/\/|Malformed declaration expecting version|Unicode strings with encoding|must be well-formed|Content is not allowed in prolog|org.xml.sax|SAXParseException|com.sun.org.apache.xerces|ParseError|nokogiri|REXML|XML syntax error on line|Error unmarshaling XML|conflicts with field|illegal character code|XML Parsing Error|SyntaxError|no root element|not well-formed|313374|ssrfhere
16 | ```
17 |
--------------------------------------------------------------------------------
/Georgian-Recon.md:
--------------------------------------------------------------------------------
1 | # Recon:
2 |
3 | ### OS: Ubuntu
4 | ..................................................
5 |
6 | ## საჭირო ხელსაწყოები.
7 | 1.[Golang ინსტალაცია](https://golang.org/doc/install)
8 |
9 | 2.[OwaspAmass](https://github.com/OWASP/Amass)
10 |
11 | 3.[Subfinder](https://github.com/projectdiscovery/subfinder)
12 |
13 | 4.[Findomain](https://github.com/Edu4rdSHL/findomain)
14 |
15 | 5.[Assetfinder](https://github.com/tomnomnom/assetfinder)
16 |
17 | 6.[Github-Search](https://github.com/gwen001/github-search)
18 |
19 | 7.[GoAltdns](https://github.com/subfinder/goaltdns)
20 |
21 | 8.[MassDns](https://github.com/blechschmidt/massdns)
22 |
23 | 9.[gau](https://github.com/lc/gau)
24 |
25 | 10.[GoSpider](https://github.com/jaeles-project/gospider)
26 |
27 | 11.[Jaeles](https://github.com/jaeles-project/jaeles)
28 |
29 | 12.[Ffuf](https://github.com/ffuf/ffuf)
30 |
31 | 13.[DirSearch](https://github.com/maurosoria/dirsearch)
32 |
33 | 14.[Httprobe](https://github.com/tomnomnom/httprobe)
34 |
35 |
36 | ## Wordlists:
37 | * [RobotsDisallowed](https://github.com/danielmiessler/RobotsDisallowed)
38 | * [SecLists Web Content](https://github.com/danielmiessler/SecLists/tree/master/Discovery/Web-Content)
39 | * [content_discovery_nullenc0de](https://gist.github.com/nullenc0de/96fb9e934fc16415fbda2f83f08b28e7)
40 | * [content_discovery_all](https://gist.github.com/jhaddix/b80ea67d85c13206125806f0828f4d10)
41 | * [commonspeak2](https://github.com/assetnote/commonspeak2-wordlists)
42 | * [all.txt](https://gist.github.com/jhaddix/86a06c5dc309d08580a018c66354a056)
43 |
44 |
45 | ## Recon Subdomains
46 |
47 | - Owasp Amass : ```amass enum -d DOMAIN -o amass```
48 |
49 | - Subfinder: ```subfinder -d DOMAIN -o subfinder```
50 |
51 | - Findomain: ```findomain -t DOMAIN -o```
52 |
53 | - Assetfinder: ```assetfinder DOMAIN | tee assetfinder```
54 |
55 | - Gobuster: ```gobuster dns -d DOMAIN -w ~/PATH/all.txt -t 250 -o gobuste```
56 |
57 | - github-search/github-subdomains.py: ```python3 github-subdomains.py -d DOMAIN -t