Skip to content

Instantly share code, notes, and snippets.

@TylerOderkirk
TylerOderkirk / carve_fw.py
Created October 8, 2014 01:38
Firmware dissector for OBi100 VoIP Telephone Adapter
#!/usr/bin/env python
import sys, binascii, struct
def main(argv=None):
for offset in [0x200, 0x10100, 0x20100, 0x30100, 0x40100, 0x50100, 0x60100, 0x70100, 0x80100, 0x90100]:
f=open(sys.argv[1], 'rb')
extract_httpd_resource_files(offset,f)
for offset in [0x95a15, 0xdd485]:
@TylerOderkirk
TylerOderkirk / crackme.c
Last active August 3, 2016 16:26
A demonstration of Markus Gaasedelen's method for reversing a binary - see URL in find_password.py
#include <stdlib.h>
#include <stdio.h>
void main(int argc, char *argv[])
{
if( argv[1][0] == 'f' ) {
if( argv[1][1] == 'o' ) {
if( argv[1][2] == 'o' ) {
if( argv[1][3] == '\x00' ) {
printf( "good password\n" );