meme-lord
meme-lord
For each of these I'll give an example domain and then the provider names. Domain: discordapp.com Providers: cloudflare Domain: gizmodo.com Providers: awsdns-14, awsdns-13, awsdns-15, public, awsdns-37 Domain: github.com Providers: awsdns-01,...
`>python cloudflare_enum.py [email protected] mypass disney.com` `{"success":false,"errors":[{"code":6004,"message":"Invalid request headers","error_chain":[{"code":6301,"message":"Invalid format for X-ATOK header"}]}],"messages":[ ],"result":null}` Same thing for any domain I put in
I notice there's a todo beside it after trying to figure out why it wasn't printing the categories so I made this issue. https://github.com/sw33tLie/bbscope/blob/05a283bf335630d834fb714a2cee257c20312005/pkg/hackerone/hackerone.go#L58
It would be nice to know what the config file should look like. I can't seem to get it working
It's possible to reduce requests by using the ability to see how many files lie behind each prefix. For example if you check `a.*~2` and it isn't found then you...
https://www.heise.de/news/Warum-ein-Sicherheitsforscher-im-Fall-Modern-Solution-verurteilt-wurde-9601392.html https://infosec.exchange/@WPalant/111776937550399546 | 2024-01-18 | [JTL Software](https://jtl-software.de/)(?) | Unnamed | A security researcher found hardcoded credentials for MySQL server. The company took him to court and he was fined [Click...
Using this in a CTF and in the README you use PHP to host the css and php file for the exploit. In order for this exploit to work you...
I noticed the warning in the Docker logs: ``` WARNING: This is a development server. Do not use it in a production deployment. Use a production WSGI server instead. ```...
This is a viewstate from an IIS/7.5 server. Viewstate: ``` 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 ``` Error: ``` Traceback (most recent call last): File "", line 1, in File "/lib/python3.11/site-packages/viewstate/viewstate.py", line 44, in decode...
Getting the error `viewstate.exceptions.ViewStateException: Unknown marker 12` when decoding a Viewstate from a Mono app. Here is the Viewstate: ``` /wEMDAwQAgAADgEMBQEMEAIAAA4DDAUBDBACAAAOBgwFAQwQAgwPAQEEVGV4dAETQWRkIFlvdXIgRmlyc3QgTm90ZQAAAAwFAwwQAgwPAQEHVmlzaWJsZQkAAAAMBQUMEAIMAA8EAQhyZXF1aXJlZAEEdHJ1ZQEEdHlwZQEEdGV4dAELcGxhY2Vob2xkZXIBFlNldCBuYW1lIGZvciB5b3VyIG5vdGUBBWNsYXNzARVmb3JtLWNvbnRyb2wgaW5wdXQtbGcAAAwFBwwQAgwADwMCAwACBAACBwABF1N0b3JlIHNvbWUgc2VjcmV0cyBoZXJlAgkAAQxmb3JtLWNvbnRyb2wAAAwFCQwQAgwADwECCQABFmJ0biBidG4tcHJpbWFyeSBidG4tbGcAAAwFCwwQAgwPAQICAAkPAQIJAAINAAAADAUDDBACDwECAgAJAA4CDAUFDBACDAAPAQIJAAINAAAADAUHDBACDAAPAQIJAAINAAAADAUFDBACDwECAgAJAA4BDAUBDBACDAAPAQIJAAINAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA= ```