I hereby claim:
- I am darkcodersc on github.
- I am phrozen (https://keybase.io/phrozen) on keybase.
- I have a public key whose fingerprint is EF3C 6EB6 8C53 6324 C9C3 E612 B99D BFFC A25A A3D1
To claim this, I am signing this object:
`sudo sh -c 'echo "JAVA_TOOL_OPTIONS=-Dsun.java2d.uiScale=2" >> /etc/environment'` | |
# Reboot machine and voila! |
#!/usr/bin/env python3 | |
# Jean-Pierre LESUEUR (@DarkCoderSc) | |
# https://keybase.io/phrozen | |
import argparse | |
import mmap | |
from itertools import chain | |
I hereby claim:
To claim this, I am signing this object:
using System; | |
using System.IO; | |
void timeStomp(String targetFile) | |
{ | |
targetFile = Path.GetFullPath(targetFile); | |
if (!File.Exists(targetFile)) | |
{ | |
throw new FileNotFoundException(String.Format("File \"{0}\" does not exists.", targetFile)); |
// Support both x86-32 and x86-64 | |
program Unprotect_RunPE; | |
{$APPTYPE CONSOLE} | |
{$R *.res} | |
uses | |
System.Classes, |
(* | |
Example of DLL Code to test DLL Injection: | |
------------------------------------------ | |
BOF>> | |
library UnprotectTestDLL; | |
uses | |
WinApi.Windows, |
(* | |
Example of DLL Code to test DLL Injection: | |
------------------------------------------ | |
BOF>> | |
library UnprotectTestDLL; | |
uses | |
WinApi.Windows, |
using System; | |
using System.Runtime.InteropServices; | |
[DllImport("ntdll.dll", SetLastError = true)] | |
static extern int NtQueryInformationProcess( | |
IntPtr processHandle, | |
int processInformationClass, | |
ref IntPtr processInformation, | |
uint processInformationLength, | |
ref IntPtr returnLength |
program NtQueryProcessInformation; | |
{$APPTYPE CONSOLE} | |
{$R *.res} | |
uses | |
Winapi.Windows, | |
System.SysUtils; |
{ | |
32Bit Example of File Melting | |
} | |
program Melt; | |
{$APPTYPE CONSOLE} | |
{$R *.res} |