$ sudo docker pull ubuntu
$ sudo docker run -t -i ubuntu:14.04 /bin/bash
root@856b6aa801af:/# apt-get update
Ign http://archive.ubuntu.com trusty InRelease
Ign http://archive.ubuntu.com trusty-updates InRelease
Ign http://archive.ubuntu.com trusty-security InRelease
Get:1 http://archive.ubuntu.com trusty Release.gpg [933 B]
Get:2 http://archive.ubuntu.com trusty-updates Release.gpg [933 B]
Get:3 http://archive.ubuntu.com trusty-security Release.gpg [933 B]
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
alias msfrpcd_startdaemon='function _setMsfrpcd(){ if [ "$#" != 2 ]; then echo "[x] Wrong arguments, usage: $0 <ip> <password>"; return; fi; cmd="msfrpcd -a $1 -P $2"; tmp123=`ps aux | grep -e "[0-9] msfrpcd" -e "[0-9] /usr/bin/msfrpcd"`; if [ -z "$tmp123" ]; then nohup bash -c "$cmd" > /tmp/msfrpcd.out & disown; fi; }; _setMsfrpcd' | |
msfrpcd_startdaemon 127.0.0.1 password | |
ping my host:
Don’t Ping -PN do port scan without checking if host is up by sending icmp
Perform a Ping Only Scan -sP do ping without port scan
TCP SYN Ping -PS (a) you can also specify ports "-PS[port1,port1,..]", default port 80
TCP ACK Ping -PA // (a)
UDP Ping -PU // (a)
SCTP INIT Ping -PY // (a)
ICMP Echo Ping -PE (b) do ping without port scan
Goals: Add links that are reasonable and good explanations of how stuff works. No hype and no vendor content if possible. Practical first-hand accounts and experience preferred (super rare at this point).
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
"""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""" | |
" CSCOPE settings for vim | |
"""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""" | |
" | |
" This file contains some boilerplate settings for vim's cscope interface, | |
" plus some keyboard mappings that I've found useful. | |
" | |
" USAGE: | |
" -- vim 6: Stick this file in your ~/.vim/plugin directory (or in a | |
" 'plugin' directory in some other directory that is in your |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Byte-compiled / optimized / DLL files | |
__pycache__/ | |
*.py[cod] | |
*$py.class | |
# C extensions | |
*.so | |
# Distribution / packaging | |
.Python |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Distributed under the MIT License (MIT) | |
# Copyright (c) 2023, Altin (tin-z) | |
import sys | |
sys.path.append(".") | |
import r2pipe | |
def list_imported_functions(r2): | |
imported_functions = [] |
- Modern Vulnerability Research Techniques on Embedded Systems
- Fuzzing with AFL for cross architecture
- Exploiting Embedded Systems devttys0 blog series
- Useful IDA/Ghidra plugins for IoT router reverse tasks, IDA version, Ghidra porting
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function gc() { for (let i = 0; i < 0x10; i++) { new ArrayBuffer(0x1000000); } } | |
// (1) convert stuff | |
var _b = new ArrayBuffer(16); | |
var _f = new Float64Array(_b); | |
var _i = new BigUint64Array(_b); | |
// converts float to big unsigned int | |
function f2i(f) | |
{ |