Skip to content

Instantly share code, notes, and snippets.

View Stankye's full-sized avatar
:octocat:
Accepting The Risk

R Stankye

:octocat:
Accepting The Risk
  • Personal Account
  • US
View GitHub Profile
INPUT_FILENAME = "input.txt"
OUTPUT_FILENAME = "out.bin"
OUTPUT_DUMP_FILENAME = "out.txt"
MAGIC_OFFSET = 0x133
CHECKSUM_OFFSET = 0x143
def print_header():
print('''
_____ _____ __ ______ _ _____
@Kiokiok
Kiokiok / FlecsBootstrapper.cs
Last active June 26, 2025 09:47
Simple example on how to render flecs entities in Godot. Two ways : individual instances or multimesh.
using Godot;
using Flecs.NET.Core;
using static Flecs.NET.Bindings.Native;
public partial class FlecsBootstrapper : Node3D
{
[Export]
Mesh renderMesh;
[Export]
@BistuaNova
BistuaNova / BotState.java
Last active September 10, 2023 11:37
RuneMate StateBot
package com.BistuaNova.bots.common.StateBot;
public abstract class BotState {
//condition under which this state will be entered (If added to states in StateBot & current State is null)
public abstract boolean enterCondition();
//Executed once when this state is set to StateBot current State
public abstract void onEnter();
//Executed every loop
@0xdevalias
0xdevalias / _deobfuscating-unminifying-obfuscated-web-app-code.md
Last active July 22, 2025 23:42
Some notes and tools for reverse engineering / deobfuscating / unminifying obfuscated web app code
@0xdevalias
0xdevalias / reverse-engineering-webpack-apps.md
Last active July 21, 2025 21:40
Some notes and techniques for reverse engineering Webpack (and a little bit about React/Vue/Angular) apps

MD5 Collision with CRC32 Preimage

Here's the scenario: We want to craft two different messages with the same MD5 hash, and a specific CRC32 checksum, simultaneously.

In other words, we want an MD5 collision attack and a CRC32 preimage attack.

This might seem like a contrived scenario, but it's exactly the one I faced while producing my PNG hashquine (Yes OK maybe that's also a contrived scenario, cut me some slack).

On its own, a CRC32 preimage attack is trivial. You can craft a 4-byte suffix that gives any message a specific checksum, calculated using a closed-form expression (which I am too lazy to derive, not even with assistance from Z3). It's not an attack per-se, since CRC32 was never meant to be cryptograpically secure in the first place.

@hvent90
hvent90 / MassStateTreeTask.cpp.template
Last active September 9, 2022 10:43
Add these files to Engine\Content\Editor\Templates to have file templates in Jetbrains Rider
%COPYRIGHT_LINE%
%PCH_INCLUDE_DIRECTIVE%
%MY_HEADER_INCLUDE_DIRECTIVE%
%ADDITIONAL_INCLUDE_DIRECTIVES%
#include "MassStateTreeExecutionContext.h"
#include "StateTreeLinker.h"
void %PREFIXED_CLASS_NAME%::Link(FStateTreeLinker& Linker)
@str4d
str4d / DemangleRust.py
Last active March 19, 2025 02:27
Ghidra script for demangling Rust symbols
# Attempts to demangle all mangled symbols in the current program using the Rust
# mangling schemes, and replace the default symbol and function signature
# (if applicable) with the demangled symbol.
#
# License: MIT OR Apache-2.0
#@author Jack Grigg <[email protected]>
#@category Symbol
import string
@ilyakurdyukov
ilyakurdyukov / faster_lzma_decoder_x86.patch
Last active June 18, 2023 17:04
Faster LZMA decoder for x86 CPUs (patch for XZ Utils).
From 387fd25f57f41009fc317f7922e957de9f370ff2 Mon Sep 17 00:00:00 2001
From: Ilya Kurdyukov <[email protected]>
Date: Tue, 14 Dec 2021 21:54:32 +0700
Subject: [PATCH] faster lzma_decoder for x86
Notice: Uses inline assembly with CMOV instruction.
Another change that removes the comparison with in_size can give a few
percent speedup for architectures with a small number of registers.
---
@Neo23x0
Neo23x0 / log4j_rce_detection.md
Last active April 11, 2025 22:49
Log4j RCE CVE-2021-44228 Exploitation Detection

log4j RCE Exploitation Detection

You can use these commands and rules to search for exploitation attempts against log4j RCE vulnerability CVE-2021-44228

Grep / Zgrep

This command searches for exploitation attempts in uncompressed files in folder /var/log and all sub folders

sudo egrep -I -i -r '\$(\{|%7B)jndi:(ldap[s]?|rmi|dns|nis|iiop|corba|nds|http):/[^\n]+' /var/log