Method 1
#!/bin/bash
while :
do
eval "echo [usernameHere] >> /root/king.txt"
eval " > /root/king.txt"
done
from pwn import * | |
context.arch = "amd64" # Change as applicable | |
e = ELF("./format") # Binary name | |
p = process(e.path) | |
l = p.libc # Load libc, initialised with correct values | |
rev = {value : key for (key, value) in l.sym.items()} | |
# Flip sym:addr dict | |
def exec_fmt(pl): | |
p.sendline(pl) | |
return p.clean() |
Kernel modules are applications that work a little different than regular applications. These don't hae a main function that woill be the entry point of the application, instead they respond to events.
Kernel Modules are applications that extends the kernel and they can be loaded and unloaded on demand without having to rebuild the entire kernel.
The below commands will allow you to manage the loadable kernel modules:
List the loaded modules:
lsmod
$ sudo pacman -S tor
$ ## nyx provides a terminal status monitor for bandwidth usage, connection details and more.
$ sudo pacman -S nyx
msg = " empty name -" // fill this string | |
msg = " simple scroll -"+ msg;position = 0; | |
function puter() { // simple scroll function | |
document.title = msg.substring(position, msg.length) + msg.substring(0, position); | |
position++; | |
if (position > msg.length) position = 0 | |
window.setTimeout("puter()",50); | |
} | |
puter(); |
# pyyaml==5.3 required. Vulnerability has been fixed in 5.3.1 | |
# More: ret2libc's report in https://github.com/yaml/pyyaml/pull/386 | |
# Explanation: https://2130706433.net/blog/pyyaml/ | |
from yaml import * | |
with open('payload.yaml','rb') as f: | |
content = f.read() | |
data = load(content, Loader=FullLoader) # Using vulnerable FullLoader |
Note: I did not author this, i found it somehwere.
############################# | |
########## Bindings | |
############################# | |
# Set the prefix to `ctrl + a` instead of `ctrl + b` | |
unbind C-b | |
set-option -g prefix C-a | |
bind-key C-a send-prefix | |
# Automatically set window title |
{ | |
"project_options":{ | |
"connections":{ | |
"hostname_resolution":[], | |
"out_of_scope_requests":{ | |
"advanced_mode":false, | |
"drop_all_out_of_scope":false, | |
"exclude":[], | |
"include":[], | |
"scope_option":"suite" |