Skip to content

Instantly share code, notes, and snippets.

View Siss3l's full-sized avatar
🦊

Sissel Siss3l

🦊
View GitHub Profile
@axxag
axxag / borderlands3.js
Last active October 30, 2024 12:50
Borderlands3-Epic-NucleusCoop
Game.DirSymlinkExclusions = ["OakGame\\Binaries\\Win64"];
Game.GameName = "Borderlands 3";
Game.HandlerInterval = 100;
Game.SymlinkExe = false;
Game.SymlinkGame = true;
Game.SymlinkFolders = true;
Game.ExecutableName = "Borderlands3.exe";
Game.GUID = "Borderlands 3";
Game.MaxPlayers = 4;
Game.MaxPlayersOneMonitor = 4;
@turekt
turekt / pwntools-gdb-docker.md
Last active January 16, 2024 06:43
Running pwntools gdb debug feature inside Docker containers

Running pwnlib gdb (pwntools) feature inside Docker

Intro

When conducting exploit development with pwntools you will often want to utilize the pwnlib gdb feature which will ease the usage of gdb and gdb scripts. Let's look into a simple example.

Assume that you have the following code you are analyzing:

// Compile: gcc -o /tmp/example -no-pie -fno-stack-protector example.c && chmod +x /tmp/example
▼ユーザーアカウント情報
 会員ID          : phg61943
 メールアドレス      : [email protected]
 インフォパネルパスワード : afw7y5z0
 インフォパネル      : https://www.xserver.ne.jp/login_info.php
 
 
▼サーバーアカウント情報
#!/bin/bash
export __NV_PRIME_RENDER_OFFLOAD=1
export __GLX_VENDOR_LIBRARY_NAME=nvidia
export __VK_LAYER_NV_optimus=NVIDIA_only
export VK_ICD_FILENAMES=/usr/share/vulkan/icd.d/nvidia_icd.json
exec "$@"
@mgeeky
mgeeky / red-teaming-bloodhound-cypher-queries.md
Last active September 25, 2024 19:18
(OBSOLETED - most recent version: https://github.com/mgeeky/Penetration-Testing-Tools/blob/master/red-teaming/bloodhound/Handy-BloodHound-Cypher-Queries.md ). A handy list of Cypher queries that I've used during AD assessments

(THIS LIST IS OBSOLETED, check out the latest version here: https://github.com/mgeeky/Penetration-Testing-Tools/blob/master/red-teaming/bloodhound/Handy-BloodHound-Cypher-Queries.md )

  • Returns computer names and their operating system for statistics purposes
MATCH (c:Computer) WHERE c.operatingsystem is not null RETURN c.name as Name, c.operatingsystem as OS
  • Returns a summary report of machines grouped by their operating systems versions, along with number of machines running specific OS version:
MATCH (c:Computer) WHERE c.operatingsystem is not null MATCH (n:Computer {operatingsystem: c.operatingsystem}) RETURN c.operatingsystem as OS, count(distinct n) AS Number ORDER BY Number DESC
@clarkb7
clarkb7 / unicode.md
Last active June 7, 2024 14:47
A guide to character encoding aware development
@abdelhady360
abdelhady360 / dorks.txt
Created February 20, 2020 09:34
List of Google Dorks for sites that have responsible disclosure program / bug bounty program
inurl /bug bounty
inurl : / security
inurl:security.txt
inurl:security "reward"
inurl : /responsible disclosure
inurl : /responsible-disclosure/ reward
inurl : / responsible-disclosure/ swag
inurl : / responsible-disclosure/ bounty
inurl:'/responsible disclosure' hoodie
responsible disclosure swag r=h:com
https://gist.github.com/cure53/df34ea68c26441f3ae98f821ba1feb9c
http://goo.gl/ZIOZqG (+)
http://rol.im/asux/
https://bitbucket.org/decalage/oletools
https://goo.gl/fBEuSF (+)
https://intothesymmetry.blogspot.co.uk/2016/05/holy-redirecturi-batman.html
https://unlogic.co.uk/2016/04/12/binary-bomb-with-radare2-prelude/
http://www.oreilly.com/webops-perf/free/files/docker-security.pdf
http://goo.gl/QM0mZx (+)
@ceres-c
ceres-c / CR95HF_ICODE_psw_dump.py
Created December 31, 2019 12:54
CR95HF Python script to read NXP ICODE tags in privacy mode
#!/usr/bin/python3
# Author: ceres-c 2019-12-29
# Authenticate to ICODE SLI tags
import hid
# Global defines & commands
password = [0x00, 0x00, 0x00, 0x00] # You have to find it yourself, try to search online in german ;-)
@StevenACoffman
StevenACoffman / Homoglyphs.md
Last active July 11, 2025 16:08
Unicode Look-alikes

Unicode Character Look-Alikes

Original Letter Look-Alike(s)
a а ạ ą ä à á ą
c с ƈ ċ
d ԁ ɗ
e е ẹ ė é è
g ġ
h һ