Skip to content

Instantly share code, notes, and snippets.

View Jack2's full-sized avatar

JAEKI KIM Jack2

View GitHub Profile
@Jack2
Jack2 / olleh_hack
Created August 16, 2017 15:51 — forked from Luavis/olleh_hack
change mac address for ollehWiFi
#!/bin/sh
if [ $# -eq 1 ]
then
if [ "$1" = "spoof" ]
then
sudo ifconfig en0 ether # Your iPhone MAC Adress
echo "spoof to iphone MAC address"
elif [ "$1" = "origin" ]
then
# Your init script
#
# Atom will evaluate this file each time a new window is opened. It is run
# after packages are loaded/activated and after the previous editor state
# has been restored.
#
# An example hack to log to the console when each text editor is saved.
#
# atom.workspace.observeTextEditors (editor) ->
# editor.onDidSave ->
dz> help app.provider.query
usage: run app.provider.query [-h] [--projection [columns [columns ...]]]
[--selection conditions] [--selection-args [arg [arg ...]]]
[--order by_column] [--vertical]
uri
Query a content provider
Examples:
Querying the settings content provider:
dz> help app.activity.start
usage: run app.activity.start [-h] [--action ACTION] [--category CATEGORY [CATEGORY ...]]
[--component PACKAGE COMPONENT] [--data-uri DATA_URI]
[--extra TYPE KEY VALUE] [--flags FLAGS [FLAGS ...]]
[--mimetype MIMETYPE]
Starts an Activity using the formulated intent.
Examples:
Start the Browser with an explicit intent:
@Jack2
Jack2 / dz> list
Created September 23, 2016 16:31
dz> list
app.activity.forintent Find activities that can handle the given intent
app.activity.info Gets information about exported activities.
app.activity.start Start an Activity
app.broadcast.info Get information about broadcast receivers
app.broadcast.send Send broadcast using an intent
app.broadcast.sniff Register a broadcast receiver that can sniff
particular intents
app.package.attacksurface Get attack surface of package
app.package.backup Lists packages that use the backup API (returns
@Jack2
Jack2 / bs64-dec.py
Created August 4, 2016 14:29
decrypt encoded base64 zip file
#!/usr/bin/env python
#-*- coding: utf-8 -*-
import base64
input_bs64 = open("location2.zip.bs64",'r')
output_zip = open("location2.zip",'w')
base64.decode(input_bs64, output_zip)
@Jack2
Jack2 / pycacls.py
Created July 29, 2016 06:34
icacls 명령어 대신 python 을 이용하여 동일한 결과를 확인 가능
import os, sys
import win32api
DIRNAME = "F:\\Dropbox\\Action\\HACKLAB\\CodeEngn-AAV"
def show_cacls (dirname):
print
print
for line in os.popen ("cacls %s" % dirname).read ().splitlines ():
print line
[profiles]
packages=fast,filecatcher,dump
[dump]
dump=mft,mbr,ram mft_export=True
[output]
type=csv
destination=local
dir=output
[filecatcher]
recursively=True
/* hddinfo.c */
#ifndef __KERNEL__
#define __KERNEL__
#endif
#ifndef MODULE
#define MODULE
#endif
#define __NO_VERSION__
#include <linux/module.h>
// clang -o coresymbolication_type_confusion coresymbolication_type_confusion.c -framework CoreFoundation
/*
coresymbolicationd is an on-demand xpc service running as root with the service name "com.apple.coresymbolicationd".
The coresymbolicationd commands match_mmap_archives, delete_mmap_archives, write_mmap_archive and read_mmap_archive
all perform insufficient type validation of xpc_object_t's:
The top level type of an xpc message is a dictionary, the function at __text:0000000100001620 in coresymbolicationd is responsible
for parsing this dictionary and sending any reply messages.