Skip to content

Instantly share code, notes, and snippets.

View annibuliful's full-sized avatar
😥
stressful

jarupong pajakgo annibuliful

😥
stressful
View GitHub Profile
@annibuliful
annibuliful / root_bypass.js
Created March 11, 2025 07:20 — forked from pich4ya/root_bypass.js
Bypass Android Root Detection / Bypass RootBeer - August 2019
// $ frida -l antiroot.js -U -f com.example.app --no-pause
// CHANGELOG by Pichaya Morimoto ([email protected]):
// - I added extra whitelisted items to deal with the latest versions
// of RootBeer/Cordova iRoot as of August 6, 2019
// - The original one just fucked up (kill itself) if Magisk is installed lol
// Credit & Originally written by: https://codeshare.frida.re/@dzonerzy/fridantiroot/
// If this isn't working in the future, check console logs, rootbeer src, or libtool-checker.so
Java.perform(function() {
var RootPackages = ["com.noshufou.android.su", "com.noshufou.android.su.elite", "eu.chainfire.supersu",
(function(_0x455ff5,
_0x5ba119){
function _0x406157(_0x87a0cd,
_0x3bdd05,
_0x35737e,
_0x38bfaa,
_0x4bdc9c){
return _0x2834(_0x87a0cd--0xb4,
_0x3bdd05);
}function _0x555598(_0x2ecde1,
#!/bin/bash
# Variables
MYSQL_PLUGIN_DIR="/usr/lib64/mysql/plugin"
AUDIT_LOG_PLUGIN="audit_log.so"
AUDIT_LOG_URL="https://github.com/zhaopinglu/mysql-audit/archive/refs/heads/master.zip"
MYSQL_CONF="/etc/my.cnf"
MYSQL_AUDIT_DIR="/var/lib/mysql"
MYSQL_USER="root"
MYSQL_PASS="your_password"
# Load the SYSTEM hive
reg load HKLM\TEMP_SYSTEM C:\Backup\system
# Load the SAM hive
reg load HKLM\TEMP_SAM C:\Backup\sam
# Get the Boot Key from the SYSTEM hive
$BootKey = ""
$SystemKey = "HKLM:\TEMP_SYSTEM\ControlSet001\Control\Lsa"
$SelectKey = Get-ItemProperty -Path $SystemKey
# Ensure the script is run with administrative privileges
if (-not ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator")) {
Write-Host "You need to run this script as an Administrator."
exit
}
# Validate file paths
$samFilePath = "C:\sam"
$systemFilePath = "C:\system"
param (
[string]$exportPath = "C:\Hashes",
[string]$outputFile = "C:\Hashes\exported_hashes.txt"
)
# Ensure running as administrator
if (-not ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator"))
{
Write-Warning "You need to run this script as an Administrator."
exit
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICBP8UjSwbrrFfR8428yGjTzo8muZlDRa2Y3tD8Rnfrh [email protected]
@annibuliful
annibuliful / th-address.json
Created June 11, 2024 13:33 — forked from mennwebs/th-address.json
Thai Address from Postal Code - JSON
This file has been truncated, but you can view the full file.
[
{
"zipCode": "10100",
"subDistrictList": [
{
"subDistrictId": "100801",
"districtId": "1008",
"provinceId": "10",
"subDistrictName": "ป้อมปราบ"
},
|=-----------------------------------------------------------------------=|
|=-------------=[ 3 Years of Attacking JavaScript Engines ]=-------------=|
|=-----------------------------------------------------------------------=|
|=------------------------------=[ saelo ]=------------------------------=|
|=-----------------------------------------------------------------------=|
The following are some brief notes about the changes that have taken place
since the release of the "Attacking JavaScript Engines" paper [1]. In
general, no big conceptional changes have happened since. Mitigations have
been added to break some of the presented techniques and, as expected, a
@annibuliful
annibuliful / postgres-cluster.yaml
Created March 13, 2023 05:19 — forked from kofemann/postgres-cluster.yaml
Running postgres in kubernetes
#
# postgres cluster in kubernetes with max 8 replicas
#
# the master is always on ${host}-0
#
#
# postgres master/slave configuration
#