Skip to content

Instantly share code, notes, and snippets.

<?xml version='1.0' encoding='utf-8'?>
<?grc format='1' created='3.7.9'?>
<flow_graph>
<timestamp>Thu Aug 7 17:08:09 2014</timestamp>
<block>
<key>options</key>
<param>
<key>author</key>
<value></value>
</param>
@inaz2
inaz2 / tcp_http_spoof.py
Last active December 14, 2022 13:02
TCP injection attack (HTTP redirection) using Scapy
$ sudo python tcp_http_spoof.py >&/dev/null &
[1] 3477
$ curl -vL http://www.google.com/
* Hostname was NOT found in DNS cache
* Trying 172.217.26.100...
* Connected to www.google.com (172.217.26.100) port 80 (#0)
> GET / HTTP/1.1
> User-Agent: curl/7.35.0
> Host: www.google.com
@inaz2
inaz2 / fizzbuzz-clang.txt
Created September 14, 2016 04:24
evaluation of fcd decompiler http://zneak.github.io/fcd/
uint64_t __libc_start_main(uint64_t rdi, uint64_t rsi, uint64_t rdx, uint64_t rcx, uint64_t r8, uint64_t r9, uint64_t sp0);
uint64_t printf(uint64_t rdi);
uint64_t puts(uint64_t rdi);
void _init(uint64_t rip)
{
if (*(uint64_t*)6295544 != 0)
{
func_400460(4195349);
}
return;
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
void leave() { puts("exiting normally..."); }
void jackpot() { puts("jackpot!"); }
void (*p_target)();
$ python tinyfuzz.py
< ''
oooooooo8 oooo o88 o8
888 888ooooo oooo o888oo oooooooo8 ooooooo ooooooo
888oooooo 888 888 888 888 888ooooooo 888 888 888 888
888 888 888 888 888 888 888 888 888
o88oooo888 o888o o888o o888o 888o 88oooooo88 88ooo888 88ooo88
Welcome to Shitsco Internet Operating System (IOS)
@inaz2
inaz2 / itrace.c
Last active September 25, 2016 23:55
basic usage of ptrace(2)
$ gcc itrace.c -o itrace
$ ./itrace /bin/ls | head
7f86ae81d2d0
7f86ae81d2d3
7f86ae820a70
7f86ae820a71
7f86ae820a74
7f86ae820a76
7f86ae820a78
import math
class LogNormal(object):
def __init__(self, skip):
self.skip = skip
self.n = 0
self.m = 0.0
self.s2 = 0.0
def is_anomaly(self, x):
@inaz2
inaz2 / parse_core_x64.py
Created September 28, 2016 04:35
getting register values from core file
$ gdb ./test
Reading symbols from ./test...(no debugging symbols found)...done.
(gdb) start
Temporary breakpoint 1 at 0x4004f1
Starting program: /home/user/tmp/test
Temporary breakpoint 1, 0x00000000004004f1 in main ()
1: x/i $pc
=> 0x4004f1 <main+4>: pop rbp
(gdb) i r
$ gcc uaf-fopen.c
uaf-fopen.c: In function ‘main’:
uaf-fopen.c:20:25: warning: assignment makes pointer from integer without a cast [enabled by default]
*(void **)(p1+0xd8) = 0x601028-0x88;
^
$ ./a.out
p1 = 0x1fc8010
fp = 0x1fc8010
$ id
@inaz2
inaz2 / crackme.c
Last active March 24, 2022 10:07
solving easy crackme by angr
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
int crackme(char *s, int n)
{
if (strlen(s) != 13) {
return 0;
}
if (strcmp(s, "hacktheplanet") != 0) {