Search the Community
Showing results for tags 'query'.
-
An osint tool that uses Ahmia.fi to get Tor hidden services and descriptions that match with the users query. [Hidden Content]
-
- 2
-
- thedevilseye
- public
- (and 15 more)
-
SQLi Query Tampering extends and adds custom Payload Generator/Processor in Burp Suite’s Intruder. Advantages and Benefits Sqlmap is a great automated tool for SQL vulnerabilities but it can be a little noisy when you perform pentesting or bug hunting! One of the cool parts of Sqlmap is Tampering. Tampering gives us some functions/techniques to evade filters and WAF’s. SQLi Query Tampering gives you the flexibility of manual testing with many powerful evasion techniques. This extension has two-part: Generator: You are able to add your customized payloads All evasion techniques grouped by DBMS type Tampered payloads can be used as a Generator in Intruder or saved to clipboard/file [hide][Hidden Content]]
-
SQLi Query Tampering extends and adds custom Payload Generator/Processor in Burp Suite’s Intruder. Advantages and Benefits Sqlmap is a great automated tool for SQL vulnerabilities but it can be a little noisy when you perform pentesting or bug hunting! One of the cool parts of Sqlmap is Tampering. Tampering gives us some functions/techniques to evade filters and WAF’s. SQLi Query Tampering gives you the flexibility of manual testing with many powerful evasion techniques. This extension has two-part: Generator: You are able to add your customized payloads All evasion techniques grouped by DBMS type Tampered payloads can be used as a Generator in Intruder or saved to clipboard/file [hide][Hidden Content]]
-
Hi, all I'v been posting on newsgroups/usenet and trying to figure out how to query the X-Ufhash NNTP header that returns a long encrypted string to get meaningfull info X-Ufhash : ZaQJEMf5JdvcWEOleKoXo4ljK0hv5rauvinj9qfPFH9gkEPA9vOw7Jqtkzj1SWuX6Q8ZeGvPfoGqFZipnXALeUtU8QLJQ513NMFAEVrNG2z3xZ48ksSy%2BKsEFCn6UJps8tZrNOrMiMKF%2FNofAzkyepiHCjV5CTN9PZ%2BV54b86ugEh9hPoGwPMgxFJJ8naz5uHr%2BHog6zUm4qfvxfrhgiuz17g%2BMO07eqsGuJ is there some kind of way to decode ? any ideas ? thank's in advance
-
Hi, all I'd like to know how to query NNTP headers Injection-Info:logging-data, X-Trace, NNTP-X-TOR-Router, NNTP-X-Ufhash, Content-ID article-number in Xref: newsgroup-server newsgroup-name:article-number to get more info ? any script/app/program/code on the net ? thank's
-
Hi, I have a log from a newsgroup NNTP header from a newsgroup message containing 3 string/numbers which I would like to further investigate Xref: news.newsserver.net newsgroupname:<NUMBER> Injection-Info:logging-data="<NUMBER>" AND Message-ID: <STRING>@subnewsserver.newsserver.net is there a tool/script/program to query remote NNTP server subnewsserver.newsserver.net / newsserver.net with those <NUMBER>/<STRING> that would return more info ? NOTE: in order to abride "Disallowed and unacceptable posts." rules I'v replaced <NUMBER> replacing a 5 digit decimal number regex: /[0-9]{5}/ <STRING> replacing a 13 character string regex: /[a-z0-9\$]{13}/ newsserver replacing news server name subnewsserver replacing sub news server name newsgroupname replacing news group name name thank's in advance 🙂
-
- networking
- nntp
-
(and 4 more)
Tagged with:
-
$ python3 hashboy.py __ __ __ / /_ ____ ______/ /_ / /_ ____ __ __ / __ \/ __ `/ ___/ __ \/ __ \/ __ \/ / / / / / / / /_/ (__ ) / / / /_/ / /_/ / /_/ / /_/ /_/\__,_/____/_/ /_/_.___/\____/\__, / /____/ Author:Leiothrix Github:[Hidden Content] usage: hashboy.py [-h] [-s HASH] [-f FILE] [-t THREADS] optional arguments: -h, --help show this help message and exit -s HASH, --hash HASH hash -f FILE, --file FILE file containing hashes -t THREADS, --threads THREADS number of threads [Hidden Content]
-
- 2
-
- hashboy-tool
- hash
-
(and 2 more)
Tagged with: