This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
if [ $# -eq 1 ] | |
then | |
if [ "$1" = "spoof" ] | |
then | |
sudo ifconfig en0 ether # Your iPhone MAC Adress | |
echo "spoof to iphone MAC address" | |
elif [ "$1" = "origin" ] | |
then |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Your init script | |
# | |
# Atom will evaluate this file each time a new window is opened. It is run | |
# after packages are loaded/activated and after the previous editor state | |
# has been restored. | |
# | |
# An example hack to log to the console when each text editor is saved. | |
# | |
# atom.workspace.observeTextEditors (editor) -> | |
# editor.onDidSave -> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
dz> help app.provider.query | |
usage: run app.provider.query [-h] [--projection [columns [columns ...]]] | |
[--selection conditions] [--selection-args [arg [arg ...]]] | |
[--order by_column] [--vertical] | |
uri | |
Query a content provider | |
Examples: | |
Querying the settings content provider: |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
dz> help app.activity.start | |
usage: run app.activity.start [-h] [--action ACTION] [--category CATEGORY [CATEGORY ...]] | |
[--component PACKAGE COMPONENT] [--data-uri DATA_URI] | |
[--extra TYPE KEY VALUE] [--flags FLAGS [FLAGS ...]] | |
[--mimetype MIMETYPE] | |
Starts an Activity using the formulated intent. | |
Examples: | |
Start the Browser with an explicit intent: |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
dz> list | |
app.activity.forintent Find activities that can handle the given intent | |
app.activity.info Gets information about exported activities. | |
app.activity.start Start an Activity | |
app.broadcast.info Get information about broadcast receivers | |
app.broadcast.send Send broadcast using an intent | |
app.broadcast.sniff Register a broadcast receiver that can sniff | |
particular intents | |
app.package.attacksurface Get attack surface of package | |
app.package.backup Lists packages that use the backup API (returns |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python | |
#-*- coding: utf-8 -*- | |
import base64 | |
input_bs64 = open("location2.zip.bs64",'r') | |
output_zip = open("location2.zip",'w') | |
base64.decode(input_bs64, output_zip) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import os, sys | |
import win32api | |
DIRNAME = "F:\\Dropbox\\Action\\HACKLAB\\CodeEngn-AAV" | |
def show_cacls (dirname): | |
for line in os.popen ("cacls %s" % dirname).read ().splitlines (): | |
print line |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[profiles] | |
packages=fast,filecatcher,dump | |
[dump] | |
dump=mft,mbr,ram mft_export=True | |
[output] | |
type=csv | |
destination=local | |
dir=output | |
[filecatcher] | |
recursively=True |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* hddinfo.c */ | |
#ifndef __KERNEL__ | |
#define __KERNEL__ | |
#endif | |
#ifndef MODULE | |
#define MODULE | |
#endif | |
#define __NO_VERSION__ | |
#include <linux/module.h> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// clang -o coresymbolication_type_confusion coresymbolication_type_confusion.c -framework CoreFoundation | |
/* | |
coresymbolicationd is an on-demand xpc service running as root with the service name "com.apple.coresymbolicationd". | |
The coresymbolicationd commands match_mmap_archives, delete_mmap_archives, write_mmap_archive and read_mmap_archive | |
all perform insufficient type validation of xpc_object_t's: | |
The top level type of an xpc message is a dictionary, the function at __text:0000000100001620 in coresymbolicationd is responsible | |
for parsing this dictionary and sending any reply messages. |