Skip to content

Instantly share code, notes, and snippets.

###############################################
# TX SX OS unpacker - by hexkyz and naehrwert #
###############################################
from Crypto.Cipher import AES
from Crypto.Util import Counter
import os
import struct
"""
@goofwear
goofwear / poke.bat
Created May 15, 2020 06:13 — forked from HumanGamer/poke.bat
Scripts for building Pokemon Ruby from pret through WSL
@echo off
set distro=Debian
pushd %~dp0
if "%1"=="initwsl" (
echo Configuring WSL...
wsl -d %distro% -u root -e bash -l -i -c "sudo ln -s /proc/self/mounts /etc/mtab"
wsl -d %distro% -u root -e bash -l -i -c "apt update && apt -y install wget xz-utils libxml2 gnupg build-essential libpng-dev"
###########################################################
# TX SX OS MIPS VM disassembler - by hexkyz and naehrwert #
###########################################################
import os
import re
import struct
host_calls_0 = {
0x8E943DA2 : "host_crc32 (ptr r4r5, len r6)",
from Crypto.Cipher import AES
from Crypto.Util import Counter
import struct
"""
typedef struct boot_dat_hdr
{
unsigned char ident[0x10];
unsigned char sha2_s2[0x20];
unsigned int s2_dst;
@goofwear
goofwear / gist:ee6a5efaffc2f0980e95e8a9aee0a8ef
Created January 30, 2020 19:26 — forked from philfreo/gist:7257723
Facebook Perl source code from 2005. When browsing around thefacebook.com in 2005 the server spit out some server-side source code rather than running it. I believe this was for their old graph feature that let you visualize the graph between all your friends. The filename is `mygraph.svgz` and contains some gems such as a commented out "zuck" d…
#!/usr/bin/perl
use Mysql;
use strict;
use vars qw($school_name);
use vars qw($pass);
require "./cgi-lib.pl";
@goofwear
goofwear / README.md
Created January 30, 2020 19:23 — forked from nikcub/README.md
Facebook PHP Source Code from August 2007
@goofwear
goofwear / switchEMMCUpgradeSteps.txt
Created January 30, 2020 03:40 — forked from znxDomain/switchEMMCUpgradeSteps.txt
Nintendo Switch 32G -> 256G Upgrade Steps for MacOS
Based on this: http://www.nathanbunn.com/NandUpgradeSteps/
using this: https://github.com/ihaveamac/ninfs
and using this: https://github.com/rajkosto/memloader
Using native MacOS tools + NinFS and memloader on the switch.
- Make Backup of 32G NAND
Use Hekate
- Install 256G NAND
- Restore boot0/1 backups with hekate
@goofwear
goofwear / ChromeAppDownloader.py
Created January 19, 2020 04:23 — forked from arulrajnet/ChromeAppDownloader.py
Python Script to download the Chrome Extensions (CRX) file directly from the google chrome web store.
# -*- coding: utf-8 -*-
"""
Python Script to download the Chrome Extensions (CRX) file directly from the google chrome web store.
Referred from http://chrome-extension-downloader.com/how-does-it-work.php
"""
from __future__ import division
import argparse
import requests
@goofwear
goofwear / 20200114-TLP-WHITE_CVE-2020-0601.md
Created January 19, 2020 03:29 — forked from SwitHak/20200114-TLP-WHITE_CVE-2020-0601.md
BlueTeam CheatSheet * CVE-2020-0601 * crypt32.dll | Last updated: 2020-01-17 2220 UTC

CVE-2020-0601 AKA ChainOfFools OR CurveBall

General

  • Microsoft disclosed a vulnerability in their monthly Patch Tuesday referenced under CVE-2020-0601.
  • The vulnerability was discovered by the U.S. National Security Agency, anounced today (2020-01-14) in their press conference, followed by a blog post and an official security advisory.
  • The flaw is located in the "CRYPT32.DLL" file under the C:\Windows\System32\ directory.

Vulnerability explanation

  • NSA description:
  • NSA has discovered a critical vulnerability (CVE-2020-0601) affecting Microsoft Windows® cryptographic functionality.
@goofwear
goofwear / gist:bca41e3e8a6edcc8ce3aac0f804956b8
Created January 12, 2020 00:54 — forked from Pusungwi/gist:7212599
A List of Javascript Emulator