Dockerfile:
FROM i386/alpine:3.18 as build-env
ENV LTRACE_DIR=/build/ltrace
ENV LIBELF_DIR=/build/libelf
ENV BUILD_PREFIX=/usr/local
# Install tools and dependencies
Dockerfile:
FROM i386/alpine:3.18 as build-env
ENV LTRACE_DIR=/build/ltrace
ENV LIBELF_DIR=/build/libelf
ENV BUILD_PREFIX=/usr/local
# Install tools and dependencies
| https://github.com/eclipse-ee4j/jersey/blob/2.x/core-common/src/main/java/org/glassfish/jersey/uri/UriComponent.java#L705 |
| bypassSecurityTrustHtml | |
| bypassSecurityTrustStyle | |
| bypassSecurityTrustScript | |
| bypassSecurityTrustUrl | |
| bypassSecurityTrustResourceUrl | |
| innerHTML | |
| outerHTML | |
| insertAdjacentHTML | |
| document.write | |
| eval( |
| import sys | |
| # Define the access rights and their corresponding bit values | |
| ACCESS_RIGHTS = { | |
| "DELETE": 0x00010000, | |
| "READ_CONTROL": 0x00020000, | |
| "WRITE_DAC": 0x00040000, | |
| "WRITE_OWNER": 0x00080000, | |
| "SYNCHRONIZE": 0x00100000, | |
| "KEY_QUERY_VALUE": 0x00000001, |
| import idc | |
| import idaapi | |
| import ida_hexrays | |
| import idautils | |
| from functools import lru_cache | |
| import time | |
| class NodeMetadata: |
| fmt = '%(asctime)s | %(levelname)3s | [%(filename)s:%(lineno)3d] %(funcName)s() | %(message)s' | |
| datefmt = '%Y-%m-%d %H:%M:%S' # Date format without milliseconds | |
| class CustomFormatter(logging.Formatter): | |
| COLOR_CODES = { | |
| 'DEBUG': '\033[36m', # Cyan | |
| 'INFO': '\033[35m', # Green | |
| 'WARNING': '\033[33m', # Yellow | |
| 'ERROR': '\033[31m', # Red |
| New-Item -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" -Force | Out-Null; New-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" -Name "NoAutoRebootWithLoggedOnUsers" -Value 1 -PropertyType DWORD -Force | |
| Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" -Name "AUPowerManagement" -Type DWord -Value 0 |
| ''' | |
| This IDAPython script automates the following operations to find x64 vulnerable kernel drivers with firmware access. | |
| * Triage | |
| 1. Identify IOCTL handlers in WDM/WDF drivers | |
| 2. Find execution paths from the handlers to the target API (MmMapIoSpace*) and instructions (IN/OUT) | |
| * Analysis | |
| 1. Fix union fields for IOCTL in the handlers and subroutines | |
| 2. Propagate function argument names/types in subroutines recursively to decide if input/output can be controlled |
| import ida_kernwin | |
| import ida_hexrays | |
| class MyRightClickHandler(ida_kernwin.action_handler_t): | |
| def __init__(self): | |
| ida_kernwin.action_handler_t.__init__(self) | |
| def activate(self, ctx): | |
| # Get the current decompiled function | |
| vu = ida_hexrays.get_widget_vdui(ctx.widget) |