Skip to content

Instantly share code, notes, and snippets.

@spnow
spnow / INT2D.cpp
Created August 1, 2017 23:05 — forked from evernick/INT2D.cpp
#include <windows.h>
#include <excpt.h>
#include <stdio.h>
BOOL anti_debug_flag = TRUE;
void anti_debug()
{
__try
{
@spnow
spnow / INT3.cpp
Created August 1, 2017 23:04 — forked from evernick/INT3.cpp
#include <windows.h>
#include <excpt.h>
#include <stdio.h>
BOOL anti_debug_flag = TRUE;
void anti_debug()
{
__try
{
@spnow
spnow / ProcessFlateDecode.java
Created July 20, 2017 21:20 — forked from osima/ProcessFlateDecode.java
decode flate-decode part how to in pdf
import java.io.*;
import java.util.*;
import java.util.zip.*;
class ProcessFlateDecode {
private File f;
public ProcessFlateDecode(File f){
this.f=f;
2b 2b sub ebp, dword ptr [ebx]
2b 2f sub ebp, dword ptr [edi]
2b 30 sub esi, dword ptr [eax]
2b 31 sub esi, dword ptr [ecx]
2b 32 sub esi, dword ptr [edx]
2b 33 sub esi, dword ptr [ebx]
2b 34 41 sub esi, dword ptr [ecx + eax*2]
2b 35 41 41 41 41 sub esi, dword ptr [0x41414141]
2b 36 sub esi, dword ptr [esi]
2b 37 sub esi, dword ptr [edi]
@spnow
spnow / encription.py
Created May 9, 2017 19:24 — forked from ShaneRich5/encription.py
Solution to the Encryption problem on Hackerrank. https://www.hackerrank.com/challenges/encryption
#!/bin/python
import sys
from math import floor, ceil
sentence = raw_input().replace(" ", "")
size = len(sentence)
root = size ** .5
row = int(floor(root))
@spnow
spnow / OmniCode
Created May 9, 2017 19:18 — forked from konfou/OmniCode
An alternative to Geek Code, by Greg Webster (see README.md).
OmniCode! version 0.1.7
Description for the New Net
All codes are built in the following way:
[code symbol][attribute].[modifier].[modifier].[modifier]...
or for multiple codes:
[code symbol][attribute].[modifier]&[attribute].[modifier]...
@spnow
spnow / ssh-blocks-firewalld.sh
Created April 14, 2017 23:52 — forked from ixs/ssh-blocks-firewalld.sh
Download a public blocklist of SSH brute scanning hosts and drop their connection attempts via firewalld
#!/bin/sh
curl -s http://lists.blocklist.de/lists/ssh.txt > /tmp/ssh-ips.txt
if [ "$1" == "--force" ]; then
firewall-cmd --direct --remove-chain ipv4 filter AUTO_BLACKLIST
firewall-cmd --direct --add-chain ipv4 filter AUTO_BLACKLIST
fi
# Create Chains if not available already
@spnow
spnow / ssh-blocks-pure-iptables.sh
Created April 14, 2017 23:51 — forked from ixs/ssh-blocks-pure-iptables.sh
Download a public blocklist of SSH brute scanning hosts and drop their connection attempts via pure iptables
#!/bin/sh
curl -s http://lists.blocklist.de/lists/ssh.txt > /tmp/ssh-ips.txt
if [ "$1" == "--force" ]; then
iptables -F AUTO_BLACKLIST
iptables -A AUTO_BLACKLIST -j RETURN
fi
/usr/sbin/iptables -L AUTO_BLACKLIST -n | awk '/^DROP / { print $4 }' > /tmp/ip_ssh_blocked
#!/usr/bin/python
# Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford ([email protected])
# The author disclaims copyright to this source code.
#
# Modified slightly by Andreas Thienemann <[email protected]> for clearer exploit code
# and 64k reads
#
# This version of the exploit does write received data to a file called "dump" in the local directory
# for analysis.
@spnow
spnow / slumdogmillionaire_sol.py
Created April 14, 2017 23:50 — forked from the-st0rm/slumdogmillionaire_sol.py
Nuit du hack 2017 Quals - Slumdog Millionaire (web 100)
import requests
import random
def send_combination(combination):
URL = "http://slumdogmillionaire.quals.nuitduhack.com/"
data = {"numbers": "%s" %(combination)}
r = requests.post(URL, data=data)
winning_combination = r.content[r.content.find("Winning combination was: ")+25:r.content.find("Winning combination was: ")+54]
return winning_combination