Skip to content

Instantly share code, notes, and snippets.

View o0xmuhe's full-sized avatar
🐦
咕咕咕

o0xmuhe o0xmuhe

🐦
咕咕咕
View GitHub Profile
@o0xmuhe
o0xmuhe / nitro_reader_jsapi.rb
Created July 26, 2017 02:23
A z̶e̶r̶o̶ one-day exploit for Nitro Reader and Nitro Reader Pro
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking
@o0xmuhe
o0xmuhe / cloudSettings
Last active October 29, 2020 12:28
Surge SNell config script
{"lastUpload":"2020-10-29T12:28:10.141Z","extensionVersion":"v3.4.3"}
{
"vsicons.dontShowNewVersionMessage" : true,
"leetcode.workspaceFolder" : "\/Users\/muhe\/.leetcode",
"vsintellicode.modify.editor.suggestSelection" : "automaticallyOverrodeDefaultValue",
"[html]" : {
"editor.defaultFormatter" : "vscode.html-language-features"
},
"[json]" : {
"editor.defaultFormatter" : "vscode.json-language-features"
},
@o0xmuhe
o0xmuhe / ip6_expl_poc.c
Created March 23, 2021 05:50 — forked from Cryptogenic/ip6_expl_poc.c
Kernel exploit POC (Proof-of-Concept) for IP6_EXTHDR_CHECK double free (CVE-2020-9892). Interleaves with multi-threads for code exec. Mainly a reference for PS4 implementation.
/*
* IP6_EXTHDR_CHECK Double Free (CVE-2020-9892) Exploit PoC for FreeBSD 9.0
* https://github.com/google/security-research/security/advisories/GHSA-gxcr-cw4q-9q78
* -
* Bug credit: Andy Nguyen (@theflow0)
* Exploit credit: @SpecterDev, @tihmstar
* Thanks: @sleirsgoevy, @littlelailo, flatz (@flat_z), @balika011
* -
* Build: gcc -o expl ip6_expl_poc.c -pthread
* -