Skip to content

Instantly share code, notes, and snippets.

View valkheim's full-sized avatar
🔥
ORUGKIDHMFWWKCQ=

valkheim

🔥
ORUGKIDHMFWWKCQ=
View GitHub Profile
==> main.py <==
import math
from Crypto.Hash import SHA256
from Crypto.Util.number import getPrime, inverse, bytes_to_long, long_to_bytes, inverse, isPrime
import pyecm
def phi(p, q):
" Euler totient "
return (p - 1) * (q - 1)
const hashCode = str =>
_.reduce(
str,
(acc, c) => {
return (acc += c.charCodeAt(0)); // + ((acc << 5) - acc);
},
0
);
const intToRGB = i => {
@valkheim
valkheim / LGC.asm
Last active December 2, 2020 10:20
Linear Congruential Generator
00000000004011b0 <my_srand>:
4011b0: 55 push rbp
4011b1: 48 89 e5 mov rbp,rsp
4011b4: 89 7d fc mov DWORD PTR [rbp-0x4],edi
4011b7: 8b 7d fc mov edi,DWORD PTR [rbp-0x4]
4011ba: 89 3c 25 3c 40 40 00 mov DWORD PTR ds:0x40403c,edi ; 0x40403c holds rand_state
4011c1: 5d pop rbp
4011c2: c3 ret
4011c3: 66 2e 0f 1f 84 00 00 nop WORD PTR cs:[rax+rax*1+0x0]
4011ca: 00 00 00
@valkheim
valkheim / debup.py
Created December 27, 2020 16:16
Extract and decode McAfee quarantine BUP files
#!/usr/bin/env python
# Extract and decode McAfee quarantine BUP files
# See https://kc.mcafee.com/corporate/index?page=content&id=KB72755
import sys
import zipfile
def decode(filename):
{"timestamp":"2019-07-31T00:00:00Z","deviceRegex":{"mdns_A":[{"noMerge":true,"caseInsensitive":true,"pattern":"iphone","type":"Phone","model":"iPhone","os":"iOS","manufacturer":"Apple Inc."},{"noMerge":true,"caseInsensitive":true,"pattern":"ipad","type":"Tablet","model":"iPad","os":"iOS","manufacturer":"Apple Inc."},{"noMerge":true,"caseInsensitive":true,"pattern":"ipod","type":"Mobile","model":"iPod Touch","os":"iOS","manufacturer":"Apple Inc."},{"regex":true,"noMerge":true,"confidence":2064,"pattern":"dp-[[:alnum:]]+","model":"Echo","type":"DigitalAssistant","manufacturer":"Amazon Technologies Inc."},{"noMerge":true,"confidence":2064,"pattern":"F7C064","model":"Wemo\u00ae Bridge","type":"WeMoBridge","manufacturer":"Belkin International, Inc."}],"upnp_Notify_Server":[{"os":"Windows","pattern":"Microsoft-Windows-NT/5.1","description":"","model":"","manufacturer":"","type":"Computer","revision":""}],"http_Content":[{"pattern":"&lt;title&gt;DWL-2100AP&lt;/title&gt;","model":"DWL-2100AP","type":"Infrastructure",
@valkheim
valkheim / recaptcha.py
Last active February 28, 2021 11:27
bypass recaptcha v2
import os
import sys
import time
from optparse import OptionParser
import requests
import selenium
import speech_recognition as sr
from selenium import webdriver
from selenium.common.exceptions import NoSuchElementException
#!/bin/sh
out="vol_dump"
image=$1 # .raw .vmem .sav .bin .mem etc
function vol_op {
echo "[+] $1: $2 ${@:3}"
volatility -f $1 --profile=$2 ${@:3} > $out/$2/$3.txt
}
@valkheim
valkheim / PatchExtract.ps1
Created April 2, 2021 21:21 — forked from wumb0/PatchExtract.ps1
a gist copy of patch extract by Greg Lanaris
<#
____ ______ ______ ____ __ __
/\ _`\ /\ _ \ /\__ _\/\ _`\ /\ \/\ \
\ \ \L\ \\ \ \L\ \\/_/\ \/\ \ \/\_\\ \ \_\ \
\ \ ,__/ \ \ __ \ \ \ \ \ \ \/_/_\ \ _ \
\ \ \/ \ \ \/\ \ \ \ \ \ \ \L\ \\ \ \ \ \
\ \_\ \ \_\ \_\ \ \_\ \ \____/ \ \_\ \_\
\/_/ \/_/\/_/ \/_/ \/___/ \/_/\/_/
@valkheim
valkheim / delta_patch.py
Created April 2, 2021 21:21 — forked from wumb0/delta_patch.py
a script for applying MS patch deltas
from ctypes import (windll, wintypes, c_uint64, cast, POINTER, Union, c_ubyte,
LittleEndianStructure, byref, c_size_t)
import zlib
# types and flags
DELTA_FLAG_TYPE = c_uint64
DELTA_FLAG_NONE = 0x00000000
DELTA_APPLY_FLAG_ALLOW_PA19 = 0x00000001
set disassembly-flavor intel
set disassemble-next-line on
set history save on
set print pretty on
set pagination off
# iso env
unset env LINES
unset env COLUMNS