Sideshow Bob (from The Simpsons) drawn using HTML and CSS
This file has been truncated, but you can view the full file.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
try { | |
/* | |
Copyright The Closure Library Authors. | |
SPDX-License-Identifier: Apache-2.0 | |
*/ | |
var f, ba = function(a) { | |
switch (aa(a)) { | |
case 4: | |
case 0: |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[+] Attached | |
[+] Address of PEB : 0x7efde000 | |
[+] Total Number of Process Heaps : 3 | |
[+] Walking 0x3d0000 | |
[+] Heap type : Low Fragmentation Heap | |
[+] Heap has only 1 segment | |
[+] Parsing Segment 0x3d0000 of Heap : 0x3d0000 | |
Heap 0x3d0000 Segment : 0x3d0000 Block : 0x3d0000 Size : 0x588 User Pointer : 0x3d0008 ( Busy ) | |
Heap 0x3d0000 Segment : 0x3d0000 Block : 0x3d0588 Size : 0x240 User Pointer : 0x3d0590 ( Busy ) | |
Heap 0x3d0000 Segment : 0x3d0000 Block : 0x3d07c8 Size : 0x20 User Pointer : 0x3d07d0 ( Busy ) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
''' | |
HeapWalker - Walking Windows 7 process heaps using pydbg | |
Author : Debasish Mandal | |
Blog :http://www.debasish.in/ | |
Twitter : https://twitter.com/debasishm89 | |
Description : This python script is simplest implementation of Windows HeapWalk() API. | |
It uses pydbg and allows user to Walk Through debugee process's heaps on the fly. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
''' | |
Author : Debasish Mandal | |
Blog :http://www.debasish.in/ | |
Twitter : https://twitter.com/debasishm89 | |
A mutation based user mode (ring3) dumb in-memory IOCTL Fuzzer/Logger. | |
This script attach it self to any given process and hooks DeviceIoControl!Kernel32 API and | |
try to log or fuzz all I/O Control code I/O Buffer pointer, I/O buffer length that | |
process sends to any Kernel driver. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
var tok = window.setInterval(function() { | |
var total_req = 100;//change it to 200,300 etc..to send request to 200,300 people at a time. May slowdown network | |
var all = document.getElementsByClassName('vcard-button bt-connect bt-primary') | |
if (all.length < total_req) | |
document.body.scrollTop = document.body.scrollHeight; | |
else{ | |
clearInterval(tok);window.scrollTo(0,0); | |
for(var i = 0 ; i <= all.length; i++){ | |
all[i].click();} | |
}}, 2000); |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import re | |
import sys | |
import pefile | |
from pydbg import * | |
from pydbg.defines import * | |
def parseidalog(file): | |
all_funcs = [] | |
f = open(file) | |
funcs = f.readlines() |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from rawweb import * | |
def main(raw_stream,ssl): | |
''' | |
This Burpy module is specially written to find CSRF vulnerability in Facebook Application. | |
It has already found few minor CSRF vulnerability in FB application. Few them was qualifed for Bug Bounty. | |
It simply checks whether CSRF token validation is present in Server Side or not by removing token | |
from request and replaying it.Facebook application always throws a generic error message for CSRF error which is | |
"Please try closing and re-opening your browser". If this error is not present in response after removing the token | |
it returns +ve. | |
''' |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#include <windows.h> | |
__declspec(naked) EvilFunction() | |
{ | |
/* | |
0007FA18 01001FC4 Ä. /CALL to MessageBoxW from notepad.01001FBE | |
0007FA1C 001503C8 È. |hOwner = 001503C8 ('Find',class='#32770',parent=003C029E) | |
0007FA20 000A3A88 ˆ:.. |Text = "Cannot find "junk"" | |
0007FA24 000A8F34 4.. |Title = "Notepad" | |
0007FA28 00000040 @... \Style = MB_OK|MB_ICONASTERISK|MB_APPLMODAL | |
*/ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#POC | |
#c:\python27 | |
junk = "\x41" | |
header = "MZ" | |
header += junk * 58 | |
header += "\x80" | |
header += "\x00" * 3 | |
header += junk * 64 | |
header += "PE" | |
header += "\x00"*2 |
NewerOlder