Dockerfile:
FROM i386/alpine:3.18 as build-env
ENV LTRACE_DIR=/build/ltrace
ENV LIBELF_DIR=/build/libelf
ENV BUILD_PREFIX=/usr/local
# Install tools and dependencies
Dockerfile:
FROM i386/alpine:3.18 as build-env
ENV LTRACE_DIR=/build/ltrace
ENV LIBELF_DIR=/build/libelf
ENV BUILD_PREFIX=/usr/local
# Install tools and dependencies
https://github.com/eclipse-ee4j/jersey/blob/2.x/core-common/src/main/java/org/glassfish/jersey/uri/UriComponent.java#L705 |
bypassSecurityTrustHtml | |
bypassSecurityTrustStyle | |
bypassSecurityTrustScript | |
bypassSecurityTrustUrl | |
bypassSecurityTrustResourceUrl | |
innerHTML | |
outerHTML | |
insertAdjacentHTML | |
document.write | |
eval( |
import sys | |
# Define the access rights and their corresponding bit values | |
ACCESS_RIGHTS = { | |
"DELETE": 0x00010000, | |
"READ_CONTROL": 0x00020000, | |
"WRITE_DAC": 0x00040000, | |
"WRITE_OWNER": 0x00080000, | |
"SYNCHRONIZE": 0x00100000, | |
"KEY_QUERY_VALUE": 0x00000001, |
import idc | |
import idaapi | |
import ida_hexrays | |
import idautils | |
from functools import lru_cache | |
import time | |
class NodeMetadata: |
fmt = '%(asctime)s | %(levelname)3s | [%(filename)s:%(lineno)3d] %(funcName)s() | %(message)s' | |
datefmt = '%Y-%m-%d %H:%M:%S' # Date format without milliseconds | |
class CustomFormatter(logging.Formatter): | |
COLOR_CODES = { | |
'DEBUG': '\033[36m', # Cyan | |
'INFO': '\033[35m', # Green | |
'WARNING': '\033[33m', # Yellow | |
'ERROR': '\033[31m', # Red |
New-Item -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" -Force | Out-Null; New-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" -Name "NoAutoRebootWithLoggedOnUsers" -Value 1 -PropertyType DWORD -Force | |
Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" -Name "AUPowerManagement" -Type DWord -Value 0 |
''' | |
This IDAPython script automates the following operations to find x64 vulnerable kernel drivers with firmware access. | |
* Triage | |
1. Identify IOCTL handlers in WDM/WDF drivers | |
2. Find execution paths from the handlers to the target API (MmMapIoSpace*) and instructions (IN/OUT) | |
* Analysis | |
1. Fix union fields for IOCTL in the handlers and subroutines | |
2. Propagate function argument names/types in subroutines recursively to decide if input/output can be controlled |
import ida_kernwin | |
import ida_hexrays | |
class MyRightClickHandler(ida_kernwin.action_handler_t): | |
def __init__(self): | |
ida_kernwin.action_handler_t.__init__(self) | |
def activate(self, ctx): | |
# Get the current decompiled function | |
vu = ida_hexrays.get_widget_vdui(ctx.widget) |