This is a work in progress by someone who is learning about Binary Ninja.
References
- https://api.binary.ninja/binaryninja.binaryview-module.html
- https://gist.github.com/psifertex/6fbc7532f536775194edd26290892ef7
Get database name
# Copyright: (c) 2022, Jordan Borean (@jborean93) <[email protected]> | |
# MIT License (see LICENSE or https://opensource.org/licenses/MIT) | |
<# Example Code to Run on the Server | |
$pipeServer = [System.IO.Pipes.NamedPipeServerStream]::new("jordan-test", [System.IO.Pipes.PipeDirection]::InOut) | |
$pipeServer.WaitForConnection() | |
try { | |
$tokenStat = Get-NamedPipeClientStatistics -Pipe $pipeServer | |
$appKey = Get-SMBApplicationKey -LogonId $tokenStat.AuthenticationId | |
[System.Convert]::ToBase64String($appKey.Applicationkey) |
""" | |
extracts config from sample: 7440a7b56d3670d4204a57974fa76ae76ca78168bb181640f565976d192cc159 | |
0xca7 | |
""" | |
from elftools.elf.elffile import ELFFile | |
def read_elf(path) -> bytes: |
function Get-RdpLogonEvent | |
{ | |
[CmdletBinding()] | |
param( | |
[Int32] $Last = 10 | |
) | |
$RdpInteractiveLogons = Get-WinEvent -FilterHashtable @{ | |
LogName='Security' | |
ProviderName='Microsoft-Windows-Security-Auditing' |
' Proof of Concept: retrieving SSN for syscalling in VBA | |
' Author: Juan Manuel Fernandez (@TheXC3LL) | |
'Based on: | |
'https://www.mdsec.co.uk/2020/12/bypassing-user-mode-hooks-and-direct-invocation-of-system-calls-for-red-teams/ | |
'https://www.crummie5.club/freshycalls/ | |
Private Type LARGE_INTEGER |
""" | |
summary: drawing custom graphs | |
description: | |
Showing custom graphs, using `ida_graph.GraphViewer`. In addition, | |
show how to write actions that can be performed on those. | |
keywords: graph, actions | |
""" | |
from __future__ import print_function | |
# ----------------------------------------------------------------------- |
This is a work in progress by someone who is learning about Binary Ninja.
References
Get database name
#![allow(non_snake_case)] | |
use std::arch::global_asm; | |
use std::mem::size_of; | |
use winapi::shared::ntdef::{OBJECT_ATTRIBUTES, HANDLE, NULL, PHANDLE, NTSTATUS}; | |
use winapi::um::winnt::{ACCESS_MASK, PROCESS_VM_WRITE, PROCESS_VM_READ}; | |
#[cfg(not(target_arch = "x86_64"))] | |
compile_error!("Only x86_64 machines"); |
function javaPost(url, data) { | |
const thread = Java.use("java.lang.Thread").$new(); | |
const Tjava = Java.ClassFactory.get(thread.getContextClassLoader()); | |
const Url = Tjava.use("java.net.URL").$new(url); | |
let connection = Url.openConnection(); | |
connection = Java.cast(connection, Tjava.use("java.net.HttpURLConnection")); | |
connection.setRequestMethod("POST"); | |
connection.setDoOutput(true); | |
connection.setRequestProperty("Content-Type", "application/json;"); | |
const postData = Tjava.use("java.lang.String").$new(data); |
from hashlib import md5, sha1 | |
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes | |
from cryptography.hazmat.backends import default_backend | |
from base64 import b64encode, b64decode | |
import sys, time | |
import requests | |
DEFAULT_MASTERKEY=b'p1a2l3o4a5l6t7o8' | |
class PanCrypt(): |