This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#include <windows.h> | |
#include <excpt.h> | |
#include <stdio.h> | |
BOOL anti_debug_flag = TRUE; | |
void anti_debug() | |
{ | |
__try | |
{ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#include <windows.h> | |
#include <excpt.h> | |
#include <stdio.h> | |
BOOL anti_debug_flag = TRUE; | |
void anti_debug() | |
{ | |
__try | |
{ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import java.io.*; | |
import java.util.*; | |
import java.util.zip.*; | |
class ProcessFlateDecode { | |
private File f; | |
public ProcessFlateDecode(File f){ | |
this.f=f; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2b 2b sub ebp, dword ptr [ebx] | |
2b 2f sub ebp, dword ptr [edi] | |
2b 30 sub esi, dword ptr [eax] | |
2b 31 sub esi, dword ptr [ecx] | |
2b 32 sub esi, dword ptr [edx] | |
2b 33 sub esi, dword ptr [ebx] | |
2b 34 41 sub esi, dword ptr [ecx + eax*2] | |
2b 35 41 41 41 41 sub esi, dword ptr [0x41414141] | |
2b 36 sub esi, dword ptr [esi] | |
2b 37 sub esi, dword ptr [edi] |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/python | |
import sys | |
from math import floor, ceil | |
sentence = raw_input().replace(" ", "") | |
size = len(sentence) | |
root = size ** .5 | |
row = int(floor(root)) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
OmniCode! version 0.1.7 | |
Description for the New Net | |
All codes are built in the following way: | |
[code symbol][attribute].[modifier].[modifier].[modifier]... | |
or for multiple codes: | |
[code symbol][attribute].[modifier]&[attribute].[modifier]... |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
curl -s http://lists.blocklist.de/lists/ssh.txt > /tmp/ssh-ips.txt | |
if [ "$1" == "--force" ]; then | |
firewall-cmd --direct --remove-chain ipv4 filter AUTO_BLACKLIST | |
firewall-cmd --direct --add-chain ipv4 filter AUTO_BLACKLIST | |
fi | |
# Create Chains if not available already |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
curl -s http://lists.blocklist.de/lists/ssh.txt > /tmp/ssh-ips.txt | |
if [ "$1" == "--force" ]; then | |
iptables -F AUTO_BLACKLIST | |
iptables -A AUTO_BLACKLIST -j RETURN | |
fi | |
/usr/sbin/iptables -L AUTO_BLACKLIST -n | awk '/^DROP / { print $4 }' > /tmp/ip_ssh_blocked |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
# Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford ([email protected]) | |
# The author disclaims copyright to this source code. | |
# | |
# Modified slightly by Andreas Thienemann <[email protected]> for clearer exploit code | |
# and 64k reads | |
# | |
# This version of the exploit does write received data to a file called "dump" in the local directory | |
# for analysis. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import requests | |
import random | |
def send_combination(combination): | |
URL = "http://slumdogmillionaire.quals.nuitduhack.com/" | |
data = {"numbers": "%s" %(combination)} | |
r = requests.post(URL, data=data) | |
winning_combination = r.content[r.content.find("Winning combination was: ")+25:r.content.find("Winning combination was: ")+54] | |
return winning_combination |