Control Flow Guard is a security mitigation that verifies the target address of indirect calls. It works by having the compiler insert a check at indirect call sites to verify the validity of the call target, and also the linker write the necessary data and flags into the PE/COFF image to enable the feature on Windows' end.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
import argparse | |
import pathlib | |
import re | |
import subprocess | |
from typing import Optional, List | |
def picasso( |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import stomp | |
import time | |
import sys | |
import logging | |
logger = logging.getLogger('stomp.py') | |
logger.setLevel(logging.DEBUG) | |
ch = logging.StreamHandler() | |
ch.setLevel(logging.DEBUG) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
rem | |
rem Tentative instructions on building Krita with mingw on Windows. | |
rem | |
rem NOTE: | |
rem I do *not* recommend running this script directly, since it may | |
rem fail on random steps and it won't stop the script. | |
rem It's just for reference. | |
rem | |
set CMAKE_BIN=D:\Programming\tools\cmake-3.4.3-win32-x86\bin\ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
-- | |
-- DeSmuME and NDS Local WiFi Dissector script | |
-- | |
-- * Last Modified: 2014-06-06 | |
-- * Author: Alvin Wong (alvinhochun, alvinhochun-at-gmail-com) | |
-- | |
-- This LUA script is designed to be used with Wireshark to inspect the detail | |
-- of the NDS WiFi local multiplayer protocol. | |
-- | |
-- This script contains of three parts: |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
From 2e818d81f21f6a627bc629e477052045426b0663 Mon Sep 17 00:00:00 2001 | |
From: Alvin Wong <[email protected]> | |
Date: Fri, 13 Dec 2013 22:19:52 +0800 | |
Subject: [PATCH] Implement kexec-hardboot | |
This allows performing kexec with a full hardware reboot so that the "guest" | |
kernel does not have to worry about reinitializing hardware states. | |
I've ported the patch to this Xperia M stock kernel. The hardboot page is | |
located at 0x88000000, which is exactly 1MiB below the ram_console. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/boot/busybox sh | |
set -x | |
echo "About to kexec new kernel..." | |
if [ -x "/cache/kexec" ] && [ -f "/cache/stock_kernel" ] && [ -f "/cache/ramdisk" ]; then | |
# Builds the new cmdline | |
# The portion starting from "androidboot.emmc=true" is added by |