This is a work in progress by someone who is learning about Binary Ninja.
References
- https://api.binary.ninja/binaryninja.binaryview-module.html
- https://gist.github.com/psifertex/6fbc7532f536775194edd26290892ef7
Get database name
XZ Backdoor symbol deobfuscation. Updated as i make progress |
This is a work in progress by someone who is learning about Binary Ninja.
References
Get database name
Welcome to Jordan's grab-bag of common Binary Ninja Snippets. | |
These snippest are meant to run with the Binary Ninja Snippets Plugin | |
(http://github.com/Vector35/snippets) though they can all also be pasted | |
directly into the python console or turned into stand-alone plugins if needed. | |
To install the entire collection at once, just install the Snippets plugin via | |
the plugin manager (CMD/CTL-SHIFT-M), confirm the Snippet Editor works | |
(Tool/Snippets/Snippet Editor), and unzip this bundle (Download ZIP above) into | |
your Snippets folder. |
// Launch WinAFL with current function as hook location | |
//@author richinseattle | |
//@category _NEW_ | |
//@keybinding | |
//@menupath | |
//@toolbar | |
// Usage: | |
// Install DynamoRIO and WinAFL | |
// Add LaunchWinAFL to Ghidra scripts |
// Copyright (C) 2019 Guillaume Valadon <[email protected]> | |
// This program is published under a GPLv2 license | |
/* | |
* Decompile a function with Ghidra | |
* | |
* analyzeHeadless . Test.gpr -import $BINARY_NAME -postScript GhidraDecompiler.java $FUNCTION_ADDRESS -deleteProject -noanalysis | |
* | |
*/ |
POST /private/tuk_tuk.php HTTP/1.1 | |
Content-Length: 104 | |
User-Agent: Dalvik/1.6.0 (Linux; U; Android 4.1.2; sdk Build/MASTER) | |
Host: aktivierung-342675-deustchland-services.ru | |
Connection: close | |
Accept-Encoding: gzip, deflate | |
Content-Type: application/x-www-form-urlencoded | |
p=NjBkMDgxOTg5ODYyMmUxOThjY2Y2ZTI3OGYyNDZjMDE1OTJhOWE3M2ZiZjZlODVkMGE5NWMyNDVm | |
ZjY3NTQ5ZTc3YWNhOGQxOGM= |
This is a walk-through of how I solved the KEYGENME reverse engineering challenge at the Google CTF 2018 qualifier.
I bet you can't reverse this algorithm!
The challenge contained an executable binary called main
and a server
#!/bin/bash | |
# small tool to retreive vk.com (vkontakte) users hidden metadata (state, access, dates, counts, etc) anonymously (without login) | |
# sudo apt install curl | |
parse(){ | |
local IFS=\> | |
read -d \< CELL VALUE | |
} |
// This will open up a prompt for text to send to a console session on digital ocean | |
// Useful for long passwords | |
(function () { | |
var t = prompt("Enter text to be sent to console, (This wont send the enter keystroke)").split(""); | |
function f() { | |
var character = t.shift(); | |
var i=[]; | |
var code = character.charCodeAt(); | |
var needs_shift = "!@#$%^&*()_+{}:\"<>?~|".indexOf(character) !== -1 |
People
:bowtie: |
😄 :smile: |
😆 :laughing: |
---|---|---|
😊 :blush: |
😃 :smiley: |
:relaxed: |
😏 :smirk: |
😍 :heart_eyes: |
😘 :kissing_heart: |
😚 :kissing_closed_eyes: |
😳 :flushed: |
😌 :relieved: |
😆 :satisfied: |
😁 :grin: |
😉 :wink: |
😜 :stuck_out_tongue_winking_eye: |
😝 :stuck_out_tongue_closed_eyes: |
😀 :grinning: |
😗 :kissing: |
😙 :kissing_smiling_eyes: |
😛 :stuck_out_tongue: |