INPUT_FILENAME = "input.txt" | |
OUTPUT_FILENAME = "out.bin" | |
OUTPUT_DUMP_FILENAME = "out.txt" | |
MAGIC_OFFSET = 0x133 | |
CHECKSUM_OFFSET = 0x143 | |
def print_header(): | |
print(''' | |
_____ _____ __ ______ _ _____ |
using Godot; | |
using Flecs.NET.Core; | |
using static Flecs.NET.Bindings.Native; | |
public partial class FlecsBootstrapper : Node3D | |
{ | |
[Export] | |
Mesh renderMesh; | |
[Export] |
package com.BistuaNova.bots.common.StateBot; | |
public abstract class BotState { | |
//condition under which this state will be entered (If added to states in StateBot & current State is null) | |
public abstract boolean enterCondition(); | |
//Executed once when this state is set to StateBot current State | |
public abstract void onEnter(); | |
//Executed every loop |
Some notes and techniques for reverse engineering Webpack (and a little bit about React/Vue/Angular) apps.
Here's the scenario: We want to craft two different messages with the same MD5 hash, and a specific CRC32 checksum, simultaneously.
In other words, we want an MD5 collision attack and a CRC32 preimage attack.
This might seem like a contrived scenario, but it's exactly the one I faced while producing my PNG hashquine (Yes OK maybe that's also a contrived scenario, cut me some slack).
On its own, a CRC32 preimage attack is trivial. You can craft a 4-byte suffix that gives any message a specific checksum, calculated using a closed-form expression (which I am too lazy to derive, not even with assistance from Z3). It's not an attack per-se, since CRC32 was never meant to be cryptograpically secure in the first place.
%COPYRIGHT_LINE% | |
%PCH_INCLUDE_DIRECTIVE% | |
%MY_HEADER_INCLUDE_DIRECTIVE% | |
%ADDITIONAL_INCLUDE_DIRECTIVES% | |
#include "MassStateTreeExecutionContext.h" | |
#include "StateTreeLinker.h" | |
void %PREFIXED_CLASS_NAME%::Link(FStateTreeLinker& Linker) |
# Attempts to demangle all mangled symbols in the current program using the Rust | |
# mangling schemes, and replace the default symbol and function signature | |
# (if applicable) with the demangled symbol. | |
# | |
# License: MIT OR Apache-2.0 | |
#@author Jack Grigg <[email protected]> | |
#@category Symbol | |
import string |
From 387fd25f57f41009fc317f7922e957de9f370ff2 Mon Sep 17 00:00:00 2001 | |
From: Ilya Kurdyukov <[email protected]> | |
Date: Tue, 14 Dec 2021 21:54:32 +0700 | |
Subject: [PATCH] faster lzma_decoder for x86 | |
Notice: Uses inline assembly with CMOV instruction. | |
Another change that removes the comparison with in_size can give a few | |
percent speedup for architectures with a small number of registers. | |
--- |
You can use these commands and rules to search for exploitation attempts against log4j RCE vulnerability CVE-2021-44228
This command searches for exploitation attempts in uncompressed files in folder /var/log
and all sub folders
sudo egrep -I -i -r '\$(\{|%7B)jndi:(ldap[s]?|rmi|dns|nis|iiop|corba|nds|http):/[^\n]+' /var/log