FlashDom Massive Domain Resolver was created using Go. I built this tool just to help myself when trying to resolve domains from a file. File Download: Download while giving donation Virus Scan : VirusTotal Sha256Sum : 5855f2ce2450795128c969b53766c7282046241e7219561dc04da02e70f22dbe If you have any idea about this tool, you can leave a comment here on my blog. 🙂
Yes, I am talking about CoinHive that could turn XSS to XSS CryptoCurrency Miner to add the value when reporting XSS for bounty hunter. So, It is not just a pop-up or stealing cookies. This will give higher risk for XSS itself because CoinHive already detected by some antivirus and AntiVirus will block the website
This python code will request to crimeflare to uncovering real ip address behind cloudflare. get the real IP address of a domain which is hiding behind cloudflare.
if len(sys.argv) != 2:
print 'Usage : '+sys.argv+' [domain_name]'
print 'Example: '+sys.argv+' domain.com'
req = urllib2.Request('http://www.crimeflare.biz/cgi-bin/cfsearch.cgi', 'cfS='+sys.argv)
resp = urllib2.urlopen(req)
res = re.findall('<font color=\#c00000>(.*?)<\/font>',resp.read())
res = res.split(" ")
if len(res) == 3:
print 'Domain : '+res
print 'IP Address: '+res
print 'Country : '+res
print 'Sorry, I cannot find it. :('
Yes!! This Python code is just requesting another source, I am not that 31337 to code something like that. Might be someone who can turn off analog
From my last article, we can exploit XXE using Docx file. Now lets build exploit XXE vulnerability using Excel file. Exploit XXE Vulnerability Using Excel File? Microsoft released OOXML Document, OOXML Presentation and OOXML Workbook in 7 December 2006. Source: Wikipedia. So, what is Office Open XML? Office Open XML, also known as OpenXML or
Today, I found a vulnerability on a server which is has feature upload for docx file. I will try to explain how to exploit XXE vulnerability using docx file and how to find this vulnerability. So.. What is XXE Vulnerability? An XML External Entity attack is a type of attack against an application that parses