Swissky
|
90f4c3634e
|
PDF JS
|
2018-09-06 20:28:30 +02:00 |
|
cclauss
|
d642980f8c
|
Use octal numbers that work in both Python 2 and 3
python2 -c "print(0777 << 16L == 0o777 << 16)" # True
|
2018-09-02 14:09:55 +02:00 |
|
Swissky
|
0c707c4188
|
ImageTragick v2 + Angular 1.6+ XSS
|
2018-08-22 21:42:25 +02:00 |
|
Swissky
|
b87e14a0ed
|
Markdown formatting - Part 2
|
2018-08-13 12:01:13 +02:00 |
|
Swissky
|
65654f81a4
|
Markdown formatting update
|
2018-08-12 23:30:22 +02:00 |
|
Swissky
|
76aefd9da2
|
Path traversal refactor + AD cme module msf/empire + IIS web.config
|
2018-07-07 12:04:55 +02:00 |
|
Swissky
|
70f38d5678
|
Payloads - Quick fix
|
2018-02-23 13:48:51 +01:00 |
|
Swissky
|
f740d8e825
|
MySQL - Code exec
|
2017-11-09 09:05:50 +01:00 |
|
Swissky
|
a2d5fe5cad
|
Upload .htaccess to PHP code exec
|
2017-10-09 23:17:31 +02:00 |
|
Swissky
|
6ad7965efc
|
SSRF AWS + Shell.php{3,4,5,7}
|
2017-09-27 14:37:07 +02:00 |
|
Swissky
|
635b9f87f7
|
Reverse Shell Cheatsheet
|
2017-08-03 21:35:43 +02:00 |
|
Swissky
|
8a3693855f
|
XSS Intruder + Eicar + SSRF http://0
|
2017-07-30 13:17:00 +02:00 |
|
Swissky
|
9907a55c24
|
Image Magick - More payloads
|
2017-07-09 17:16:42 +02:00 |
|
Swissky
|
6070ece522
|
Symbolic Link Zip + SQL injection ORDER BY
|
2017-07-04 23:17:59 +02:00 |
|
Swissky
|
ab63a537e7
|
FFMpeg injection - Bypass and explanation
|
2017-06-28 22:45:36 +02:00 |
|
Swissky
|
43f8367df0
|
Update Image Tragick payloads
|
2017-06-28 11:23:16 +02:00 |
|
Swissky
|
220e9cb8bd
|
FFMpeg HLS - read passwd/shadow
|
2017-06-26 21:32:10 +02:00 |
|
Swissky
|
94470a2544
|
More payloads for XSS/SQL/LFI/Upload and XXE
|
2017-06-04 17:22:26 +02:00 |
|
Swissky
|
e89e4fd312
|
Methodology updated with RPCClient, User enumeration
|
2017-05-17 20:40:45 +02:00 |
|
swisskyrepo
|
14a82a14a4
|
Methodo, SQL,RCE,XSS,XXE updated
|
2016-12-20 19:46:06 +01:00 |
|
swisskyrepo
|
bce6dc6d3d
|
Clean project - Renamed and added PHP juggling type
|
2016-10-20 10:22:24 +07:00 |
|