Skip to content

Commit

Permalink
upload file
Browse files Browse the repository at this point in the history
  • Loading branch information
adysec committed Jun 6, 2024
1 parent 41eddd8 commit 29f8147
Show file tree
Hide file tree
Showing 2,354 changed files with 36,911 additions and 0 deletions.
60 changes: 60 additions & 0 deletions h1_asset.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,60 @@
import requests
import json
import os

def write_word(word,target):
#print(target)
if os.path.exists(target)==True:
w=0
with open(target,'r',encoding='utf-8')as f:
for line in f:
if line[:-1]==word:
w=1
else:
pass
if w == 0:
fp = open(target,'a+',encoding='utf-8')
fp.write(word+'\n')
fp.close()

else:
fp = open(target,'a+',encoding='utf-8')
fp.write(word+'\n')
fp.close()

def get_assets(handle):
url = "https://hackerone.com/graphql"
cookies = {"h1_device_id": "6b006754-624f-48dd-8640-3a6c1b2594a5", "_gcl_au": "1.1.11592276.1653657152", "_ga": "GA1.2.1701425692.1653657219", "amp_b7cba2": "LtSVdSlcq8x09-wpdce0ud.ZTFlZmNjZWQtNjMzNy00YmFlLTlmZTctNDM1MGMwZjNmOWRj..1g42qde4b.1g42s7l4j.e.2.g", "__Host-session": "dEJBMnQwcjlwQlNnYTV3b24xUHNlRWN0Z2d6ZlhBYXdoaWlISnRHL3BsNWtmcGxMWXhQN3RVc1l6aWRIWmt6UU9YU1N6ZzN6MWY3a0xBVlFLanh4NE1jN3BFb1FZQjh4YVd3eEdmb2FUQUQ4c1N0d3N0N1phS2N5V3VJTGFadVZWSnZNSStEMGxHa3Q5NkV0NVZrWW0yelJUSmIveWNIQTQxUHNtRzVwR2pQcTNCMHg0NEJNYy9aaVJvblcxRU9PRU1vRXlFMllVcTF5bVBIUFN6Y2pKTTdRakttdVhwTmdrVUw1UW43UXIvc0czZmFhYlY4MzFCTVBxSld1ZFlseU9HZ3BTcHU3Y3VVQVpTMk5QbWFoS3JlUjhtTDJxQ2Vya0c1VmRJbFlpTjNybkdqQ0dTT0lTRGpNRlRQVTB4cjM3aFR0L3JqVHZrUEJBaDBSRUNiOFJBPT0tLVhBdlpUM2Y5dnNucG5QRjhKM3dsT3c9PQ%3D%3D--2241d124b675695c0d174cae11d3e0fabb59b119", "_dd_s": "rum=0&expire=1660822945246", "AMP_b7cba2c14c": "JTdCJTIyb3B0T3V0JTIyJTNBZmFsc2UlMkMlMjJkZXZpY2VJZCUyMiUzQSUyMkx0U1ZkU2xjcTh4MDktd3BkY2UwdWQlMjIlMkMlMjJsYXN0RXZlbnRUaW1lJTIyJTNBMTY2MDgyMjA0NjA0MiUyQyUyMnNlc3Npb25JZCUyMiUzQTE2NjA4MjE0NzEzNjglMkMlMjJ1c2VySWQlMjIlM0ElMjJlMWVmY2NlZC02MzM3LTRiYWUtOWZlNy00MzUwYzBmM2Y5ZGMlMjIlN0Q=", "_gid": "GA1.2.1018576083.1660821473", "AMP_MKTG_b7cba2c14c": "JTdCJTdE"}
headers = {"User-Agent": "Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0", "Accept": "*/*", "Accept-Language": "zh-CN,zh-TW;q=0.8,en-US;q=0.5,en;q=0.3", "Accept-Encoding": "gzip, deflate", "Referer": "https://hackerone.com/cornershop?type=team", "Content-Type": "application/json", "X-Csrf-Token": "QOFiIvQ7XJceEJ/y7Z5M1KO9CcO6PBehaUSTQmgdpE33/ZSAIWNNVzBJzf8bH7d1Ynw9VKj6mesrZ2BUdfQF7Q==", "Origin": "https://hackerone.com", "Sec-Fetch-Dest": "empty", "Sec-Fetch-Mode": "cors", "Sec-Fetch-Site": "same-origin", "Te": "trailers"}
data = {"operationName":"TeamAssets","variables":{"handle":handle},"query":"query TeamAssets($handle: String!) {\n me {\n id\n membership(team_handle: $handle) {\n id\n permissions\n __typename\n }\n __typename\n }\n team(handle: $handle) {\n id\n handle\n structured_scope_versions(archived: false) {\n max_updated_at\n __typename\n }\n in_scope_assets: structured_scopes(first: 650, archived: false, eligible_for_submission: true) {\n edges {\n node {\n id\n asset_type\n asset_identifier\n instruction\n max_severity\n eligible_for_bounty\n labels(first: 100) {\n edges {\n node {\n id\n name\n __typename\n }\n __typename\n }\n __typename\n }\n __typename\n }\n __typename\n }\n __typename\n }\n out_scope_assets: structured_scopes(first: 650, archived: false, eligible_for_submission: false) {\n edges {\n node {\n id\n asset_type\n asset_identifier\n instruction\n __typename\n }\n __typename\n }\n __typename\n }\n __typename\n }\n}\n"}
r = requests.post(url, headers=headers, cookies=cookies, json=data)
response = r.json()
try:
for i in response['data']['team']['in_scope_assets']['edges']:
##print(i['node']['asset_type'],'\t',i['node']['asset_identifier'])
write_word(i['node']['asset_identifier'],'src/'+handle+'/'+i['node']['asset_type']+'.txt')
write_word(i['node']['asset_identifier'],'src/'+i['node']['asset_type']+'.txt')
except:
print(handle+'\terror')

page = 0
while True:
page = page + 1
res = requests.get('https://hackerone.com/programs/search?query=type:hackerone&sort=published_at:descending&page='+str(page))
if res.status_code != 200:
break
res = json.loads(res.text)
for i in res['results']:
word = str(i['id'])+'\t'+'https://hackerone.com'+i['url']+'\t'+i['name']+'\t'+i['handle']
url = 'https://hackerone.com'+i['url']
name = i['name']
handle = i['handle']
#建目录
if not os.path.exists('src/'+handle):
os.mkdir('src/'+handle)
write_word(word,'src/'+handle+'/note.txt')
write_word(word,'src/note.txt')
try:
get_assets(handle)
except:
print(handle+'\terror')
2 changes: 2 additions & 0 deletions requirements.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
requests

10 changes: 10 additions & 0 deletions src/23andme_bbp/URL.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
api.23andme.com
auth.23andme.com
blog.23andme.com
education.23andme.com
mediacenter.23andme.com
medical.23andme.com
store.23andme.com
therapeutics.23andme.com
you.23andme.com
research.23andme.com
1 change: 1 addition & 0 deletions src/23andme_bbp/note.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
73655 https://hackerone.com/23andme_bbp 23andMe Bug Bounty 23andme_bbp
1 change: 1 addition & 0 deletions src/50m-ctf/note.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
38489 https://hackerone.com/50m-ctf 50m-ctf 50m-ctf
2 changes: 2 additions & 0 deletions src/8x8-bounty/APPLE_STORE_APP_ID.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
348177448
8x8-work
1 change: 1 addition & 0 deletions src/8x8-bounty/DOWNLOADABLE_EXECUTABLES.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
Virtual Office Desktop
1 change: 1 addition & 0 deletions src/8x8-bounty/GOOGLE_PLAY_APP_ID.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
org.vom8x8.sipua
1 change: 1 addition & 0 deletions src/8x8-bounty/OTHER.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
Intellectual Property on Public Domains
1 change: 1 addition & 0 deletions src/8x8-bounty/SOURCE_CODE.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
https://github.com/jitsi
23 changes: 23 additions & 0 deletions src/8x8-bounty/URL.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
*.8x8.vc
*.jit.si
*.jitsi.net
connect.8x8.com
sms.8x8.com
platform.8x8pilot.com
uc.8x8pilot.com
sso.8x8pilot.com
work-staging.8x8.com
user-profile-staging.8x8.com
*.8x8staging.com
sso.8x8.com
platform.8x8.com
*.chalet.8x8.com
work.8x8.com
user-profile.8x8.com
vcc-*.8x8.com
voapi.8x8.com
https://8x8.vc/xmpp-websocket
https://webrtc.8x8.com/
cloud8.8x8.com
pay.8x8.com
admin.8x8.com
18 changes: 18 additions & 0 deletions src/8x8-bounty/WILDCARD.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
http://*.8x8.vc
http://*.jit.si
http://*.jitsi.net
http://*.8x8staging.com
http://*.chalet.8x8.com
http://vcc-*.8x8.com
https://*.chalet.8x8.com/ws/v1
http://*.packet8.net
*.8x8.vc
*.jit.si
*.jitsi.net
*.8x8staging.com
*.chalet.8x8.com
vcc-*.8x8.com
*.8x8.id
*.8x8cloud.net
*.p8t.us
*.wavecell.com
1 change: 1 addition & 0 deletions src/8x8-bounty/note.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
49732 https://hackerone.com/8x8-bounty 8x8 Bounty 8x8-bounty
6 changes: 6 additions & 0 deletions src/8x8/APPLE_STORE_APP_ID.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
com.yourcompany.Virtual-Office
com.8x8.spot
com.atlassian.JitsiMeet.ios
com.8x8.meetings
8x8-meeting-rooms
8x8-work
2 changes: 2 additions & 0 deletions src/8x8/DOWNLOADABLE_EXECUTABLES.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
Virtual Office Desktop
Jitsi Meet Desktop
3 changes: 3 additions & 0 deletions src/8x8/GOOGLE_PLAY_APP_ID.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
org.vom8x8.sipua
org.jitsi.meet
com.spot8x8.spot
1 change: 1 addition & 0 deletions src/8x8/OTHER.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
Intellectual Property on Public Domains
5 changes: 5 additions & 0 deletions src/8x8/SOURCE_CODE.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
https://github.com/jitsi/
https://github.com/orgs/8x8/packages?repo_name=8x8_messaging_java_client
https://github.com/callstats-io/
https://github.com/jitsi
https://github.com/8x8/8x8_messaging_java_client
53 changes: 53 additions & 0 deletions src/8x8/URL.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,53 @@
*.ucverse.com
*.8x8.com
*.packet8.net
*.easycontactnow.com
*.dxi.eu
accountmanager.8x8.com
*.contactnow.8x8.com
sso.8x8.com
*.jit.si
vcc-*.8x8.com
*.8x8.vc
*.wavecell.com
*.callstats.io
*.8x8e2e.com
*.8x8pilot.com
*.jitsi.net
*.p8t.us
*.8x8.id
*.8x8.uk
*.8x8.co.uk
*.fuze.com
*.fuze.site
*.thinkingphones.com
*.thinkingphones.net
*.adgjmp.net
www.8x8.com
*.sameroom.io
*.mycontactual.com
*.jitsi.org
support.8x8.com
get8x8.com
*.8x8staging.com
*.8x8cloud.net
8x8.force.com
connect.8x8.com
work-staging.8x8.com
work.8x8.com
voapi.8x8.com
sms.8x8.com
user-profile-staging.8x8.com
platform.8x8.com
user-profile.8x8.com
https://webrtc.8x8.com/
express.8x8.com
cloud8.8x8.com
supersite.8x8.com
pay.8x8.com
admin.8x8.com
vm.8x8.com
www.fuzemeeting.com
www.wavecell.com
wavecell.zendesk.com
fuze.me
56 changes: 56 additions & 0 deletions src/8x8/WILDCARD.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,56 @@
http://*.ucverse.com
http://*.8x8.com
http://*.packet8.net
http://*.easycontactnow.com
http://*.dxi.eu
http://*.contactnow.8x8.com
http://*.jit.si
http://vcc-*.8x8.com
http://*.8x8.vc
http://*.wavecell.com
http://*.8x8e2e.com
http://*.8x8pilot.com
http://*.jitsi.net
http://*.p8t.us
http://*.8x8.id
http://*.8x8.uk
http://*.8x8.co.uk
http://*.fuze.com
http://*.fuze.site
http://*.thinkingphones.com
http://*.thinkingphones.net
http://*.adgjmp.net
http://*.8x8staging.com
http://*.8x8cloud.net
http://*.sameroom.io
http://*.mycontactual.com
http://*.jitsi.org
https://*.chalet.8x8.com/ws/v1
http://*.chalet.8x8.com
*.ucverse.com
*.8x8.com
*.packet8.net
*.easycontactnow.com
*.dxi.eu
*.contactnow.8x8.com
*.jit.si
vcc-*.8x8.com
*.wavecell.com
*.8x8e2e.com
*.8x8pilot.com
*.jitsi.net
*.p8t.us
*.8x8.id
*.8x8.uk
*.8x8.co.uk
*.fuze.com
*.fuze.site
*.thinkingphones.com
*.thinkingphones.net
*.adgjmp.net
*.8x8staging.com
*.8x8cloud.net
*.sameroom.io
*.mycontactual.com
*.jitsi.org
qm-*.8x8.com
1 change: 1 addition & 0 deletions src/8x8/note.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
32665 https://hackerone.com/8x8 8x8 8x8
3 changes: 3 additions & 0 deletions src/AI_MODEL.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
Workers AI
Penny
Grammarly AI Assistant
5 changes: 5 additions & 0 deletions src/API.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
Crypto.com mobile app APIs that require an account
Crypto.com Exchange APIs that require an account
apimobile.vueling.com
funding-webhooks.remitly.io
hub-api-sandbox.remitly.io
Loading

0 comments on commit 29f8147

Please sign in to comment.