Skip to content

Instantly share code, notes, and snippets.

View 0xm4ud's full-sized avatar
:octocat:

F. Donato 0xm4ud

:octocat:
View GitHub Profile

Keybase proof

I hereby claim:

  • I am m4udSec on github.
  • I am m4ud (https://keybase.io/m4ud) on keybase.
  • I have a public key whose fingerprint is 2A16 58A6 A685 F7AE 6B88 C980 E5A4 B621 B632 8C34

To claim this, I am signing this object:

@0xm4ud
0xm4ud / autorun.ps1
Last active January 15, 2023 01:31
WinDbg autorun
Start-Process -FilePath .\Desktop\vulnAppDEP.exe -WindowStyle Hidden
Start-Process powershell -ArgumentList "-NoExit", "-File \tools\osed-scripts\attach-process.ps1 -process-name vulnAppDEP" -WindowStyle Hidden
Start-Sleep -Seconds 3
$process = Get-Process -Name "DbgX.Shell"
Register-ObjectEvent -InputObject $process -EventName Exited -Action {
# Code to run when the WinDbg process exits
Write-Host "WinDbgX has been closed."
@0xm4ud
0xm4ud / iptohex.sh
Created January 15, 2023 01:33
Oneliner to convert IP to hex in reverse for Assembly ws32 shell
python3 -c 'print("".join([octet[2:] for octet in [hex(int(octet)) for octet in input("Enter an IP address: ").split(".")][::-1]]))'
@0xm4ud
0xm4ud / asciitohex.sh
Created January 15, 2023 01:34
READ string then convert to hex and print it in reverse
python3 -c 'print("".join(hex(ord(c))[2:].zfill(2) for c in input("Enter the string: ")[::-1]))'

Keybase proof

I hereby claim:

  • I am 0xm4ud on github.
  • I am m4ud (https://keybase.io/m4ud) on keybase.
  • I have a public key ASB_w23MyhiVlmpTQWtTRWdDpMwadpQq7xDWbS1p6DybjAo

To claim this, I am signing this object:

import xml.etree.ElementTree as ET
import sys
import re
# Register namespaces to ensure they are preserved in the output
ET.register_namespace('', 'http://www.w3.org/2000/svg')
ET.register_namespace('xlink', 'http://www.w3.org/1999/xlink')
def scale_svg_path(svg_file, output_file, scale_factor):
tree = ET.parse(svg_file)