Burp Decoder : Send the token to the Decoder and try to decode the string
Burp Sequencer : Send request to sequencer and "Start Live Capture"
"Burp Sequencer will repeatedly issue the request and extract the relevant token from the application's responses."
Burp Intruder : Send request to Intruder, and select either "Character frobber" or "Bit flipper" payload type and then start attack.
The "Character frobber" payload type operates on a string input and modifies the value of each character position in turn.
e: Effective
This means the capability is “activated”.
p: Permitted
This means the capability can be used/is allowed.
i: Inherited
The capability is kept by child/subprocesses upon execve() for example.
www.decompileandroid.com
www.virustotal.com
https://github.com/pjlantz/droidbox
{echo,hello,world}
CMD=$'\x20a\x20b\x20c';echo$CMD
CMD=$'\x20a\x20b\x20c'&&echo$CMD
google.com&&CMD=$'\x20/etc/passwd'&&cat$CMD
--user-agent
-X POST
--user username:password // HTTP basic auth
--data "username=toto&password=toto" // for POST method
--cookie "data=mydata"
--referer "my referer"