IERAE CTF had one of the coolest pwn challenges I've done in the while. It was written by hugeh0ge.
Here's the full source:
// gcc chal.c -fno-stack-protector -static -o chal
#include <stdio.h>
#include
IERAE CTF had one of the coolest pwn challenges I've done in the while. It was written by hugeh0ge.
Here's the full source:
// gcc chal.c -fno-stack-protector -static -o chal
#include <stdio.h>
#include
# This script automatically handles Syncthing conflicts on text files by applying a | |
# git three-way merge between the previously synced version and each divergent version. | |
# It depends on the watchdog package and git. | |
# For automatic dependency installation when running with ´uv run --script deconflicter.py´: | |
# /// script | |
# requires-python = ">=3.10" | |
# dependencies = [ | |
# "watchdog", |
Disclaimer: I am not a Windows Admin and I'm not even that good with PowerShell.
I wanted to be able to SSH into my Windows laptop directly into Linux. I also wanted to disable password authentication and only allow public key (RSA in my case) authentication.
Scott Hanselman wrote a blog post on how to make your default WSL2 distro your default shell for SSH. Windows OS Hub published an article on using public key
csrutil disable | |
sudo nvram boot-args="intcoproc_unrestricted=1 kext-dev-mode=1 amfi_allow_any_signature=1 amfi_unrestrict_task_for_pid=1 PE_i_can_has_debugger=1 cs_enforcement_disable=1 amfi_get_out_of_my_way=1 amfi=0xff cs_debug=1 ipc_control_port_options=0" | |
sudo spctl --global-disable | |
sudo defaults write /Library/Preferences/com.apple.security GKAutoRearm -bool NO | |
sudo defaults write /Library/Preferences/com.apple.security.coderequirements Entitlements -string always | |
sudo defaults write /Library/Preferences/com.apple.security.coderequirements AllowUnsafeDynamicLinking -bool YES | |
sudo defaults write /Library/Preferences/com.apple.security.libraryvalidation.plist DisableLibraryValidation -bool YES | |
defaults write com.apple.loginwindow DisableScreenLockImmediate -bool yes |
** Collection #1 passwords list ** | |
Hello everyone, | |
Recently, a dark web monitoring firm 4iQ discovered a massive trove of 41GB data file containing 1.4 billion billion login credentials including emails and passwords in clear-text format. | |
This db was already found in the dark net during january and succefully removed from the internet but it has been newly uploaded. | |
magnet:?xt=urn:btih:7ffbcd8cee06aba2ce6561688cf68ce2addca0a3&dn=BreachCompilation&tr=udp%3A%2F%2Ftracker.openbittorrent.com%3A80&tr=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969&tr=udp%3A%2F%2Ftracker.coppersurfer.tk%3A6969&tr=udp%3A%2F%2Fglotorrents.pw%3A6969&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337 | |
- follow me on https://twitter.com/criptixo :) |
Let's say you want to access the application shared preferences in /data/data/com.mypackage.
You could try to run adb shell
and then run-as com.mypackage
( or adb shell run-as com.mypackge ls /data/data/com.mypackage/shared_prefs
),
but on a production release app downloaded from an app store you're most likely to see:
run-as: Package 'com.mypackage' is not debuggable