- All in Virzz
- Alfred Workflow
- Switch DNS This is an useful workflow for switch your DNS.
- CTF & Pentest
The Cyber Swiss Army Knife for terminal.
brew install virzz/virzz/god
- Download from GitHub
A tool for parse some files
A tool for generate Gopher exp
A Git source leak exploit tool that restores the entire Git repository, including data from stash, for white-box auditing and analysis of developers' mind
A jwt tool with Print/Crack/Modify
Easy to remember reverse shell that should work on most Unix-like systems.
Example: https://resh.now.sh/localhost:1337
Luke Childs didn't accept PR#15, so I made a new one
Reference
https://github.com/Lz1y/reverse-shell
This is an useful workflow for switch your DNS.
Default DNS:
Name | Server IP |
---|---|
8.8.8.8,8.8.4.4 | |
Aliyun | 223.5.5.5,223.6.6.6 |
114 | 114.114.114.114,114.114.115.115 |
You can add your custom DNS Server for your work!
Fuck the hash proof of work for ctfer
Usage:
Usage:
request: /?c=[code]&t=[hash type]&pf=[prefix string]&sf=[suffix sstring]&p=[pos]&r=[true]
Params:
- c [string] Code (**require**)
- t [string] hash Type : md5 sha1 (**require**)
- p [int] starting Position of hash
- pf [string] text Prefix
- sf [string] text Suffix
- r [boolean] Raw resopnse
eg: /?c=abcdef&t=md5
/?c=abcdef&t=md5&pf=v&sf=k&p=6