Skip to content

Instantly share code, notes, and snippets.

View shirobachi's full-sized avatar

Simon Hryszko shirobachi

View GitHub Profile
@pmbauer
pmbauer / OCR.md
Last active May 14, 2023 02:43
OCR Templater Script for Obsidian
creation date tags
<% tp.file.creation_date() %>
OCR

<%* const supportedFileTypes = ["jpeg", "jpg", "png"]; const images = this.app.vault.getFiles().filter((item) => supportedFileTypes.indexOf(item.extension) >= 0); const target = await tp.system.suggester((item) => item.path, images, true); const out = await tp.user.ocr({ocr_input: target.path});

@bpohoriletz
bpohoriletz / rails_docker.sh
Last active September 15, 2024 00:17
Rails 7.0.1/Ruby 3.1/SQLite app in Docker
# set ruby/rails version
export DOCKER_RAILS_VERSION="7.0.1"
export DOCKER_RUBY_VERSION="3.1.0"
export RAILS_PROJECT_NAME="rails7"
# create folder for the project and add Gemfile with necessary rails version
mkdir "$RAILS_PROJECT_NAME"
cd "$RAILS_PROJECT_NAME"
echo "ruby '$DOCKER_RUBY_VERSION'
source 'https://rubygems.org'
gem 'rails', '$DOCKER_RAILS_VERSION'" > Gemfile
@tothi
tothi / ms-msdt.MD
Last active June 16, 2025 21:37
The MS-MSDT 0-day Office RCE Proof-of-Concept Payload Building Process

MS-MSDT 0-day Office RCE

MS Office docx files may contain external OLE Object references as HTML files. There is an HTML sceme "ms-msdt:" which invokes the msdt diagnostic tool, what is capable of executing arbitrary code (specified in parameters).

The result is a terrifying attack vector for getting RCE through opening malicious docx files (without using macros).

Here are the steps to build a Proof-of-Concept docx:

  1. Open Word (used up-to-date 2019 Pro, 16.0.10386.20017), create a dummy document, insert an (OLE) object (as a Bitmap Image), save it in docx.
@wenijinew
wenijinew / .tmux.conf
Last active February 25, 2024 21:58
Tmux Configuration
set -g TMUX_PLUGIN_MANAGER_PATH "$GITHUB_REPO_ROOT"
set -g @plugin 'tmux-plugins/tpm'
set -g @plugin 'wenijinew/glamour.tmux'