This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Copy folder Xcode.app/Contents/Developer/Library/Xcode/Templates/Project Templates/Mac/Application/Command Line Tool.xctemplate folder | |
| to ~/Library/Developer/Xcode/Templates/Custom/ | |
| Modifity the plist to the following. Scroll down when choosing new project template and should be there in Custom area. | |
| The trick is this: | |
| <key>Project</key> | |
| <dict> | |
| <key>SharedSettings</key> | |
| <dict> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| This is a collection of NFO templates from various PSP Crack / Warez Groups | |
| --- 4Fun | |
| ▄▀ ▄▄█▓▄ ____________________ __________ ▄▓█▄▄ ▀▄ | |
| ▐█ ███▀██▓▄ / | \_ _____/ | \ \@TiLK ▄▓██▀███ █▌ | |
| ▓██▀ ░▐█▓▓ / | || __) | | / | \ ▓▓█▌░ ▀██▓ | |
| ▀█▓ ░▐█▓▌ / ^ / \ | | / | \ ▐▓█▌░ ▓█▀ | |
| ▀▀ ▄██▓ \____ |\___ / |______/\____|__ / ▓██▄ ▀▀ | |
| ▄██▓▀ ▄▀ |__| \/ \/ ▀▄ ▀▓██▄ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| /** | |
| * Fuzzing arbitrary functions in ELF binaries, using LIEF and LibFuzzer | |
| * | |
| * Full article on https://blahcat.github.io/ | |
| * @_hugsy_ | |
| * | |
| */ | |
| #include <dlfcn.h> | |
| #include <stdio.h> | |
| #include <stdlib.h> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| /* retrieve the current function information - we need this to extract the stack frame */ | |
| func_t *current_function = get_func(current_addr); | |
| /* retrieve the stack frame for this function - IDA encapsulates it as struc_t */ | |
| struc_t *frame = get_frame(current_function); | |
| /* now each variable is a member of the structure - Chris Eagle book shows how to iterate over this */ | |
| for (int i = 0; i < frame->memqty; i++) | |
| { | |
| /* so each variable is a member - we can retrieve its netnode id via the .id field - in case of structures/stack variables | |
| * this is an address starting by 0xFF but it's still a netnode like everything else in IDA | |
| */ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| from z3 import * | |
| import struct | |
| # calculate e,f,d for a given input password | |
| def calc(m): | |
| e = 0 | |
| f = 0 | |
| d = 0 | |
| for i in xrange(0, len(m)): | |
| c = ord(m[i]) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| package main | |
| import ( | |
| "crypto/tls" | |
| "fmt" | |
| "io/ioutil" | |
| "net/http" | |
| "net/url" | |
| "strings" | |
| ) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #include <unistd.h> | |
| #include <stdlib.h> | |
| #include <stdio.h> | |
| #include <signal.h> | |
| #include <pty.h> | |
| #include <fcntl.h> | |
| #include <time.h> | |
| #include <sys/wait.h> | |
| // gcc cook3.c -lutil -o cook3 -Wall |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| """ Assembly REPL in gdb / possible sketchy binary patcher. | |
| Usage: | |
| gdb -q ./target | |
| -x rappel.py adds 'rappel' command | |
| [-write] patches binary on disk, sometimes! | |
| """ | |
| import gdb, tempfile, keystone as ks | |
| class Rappel(gdb.Command): |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| LIMIT = 5 | |
| BOUND = 'object' | |
| def prelude(limit: int, bound: str) -> None: | |
| print('from typing import Callable, Iterable, Iterator, Tuple, TypeVar, overload') | |
| print('Ts = TypeVar(\'Ts\', bound={bound})'.format(bound=bound)) | |
| print('R = TypeVar(\'R\')') | |
| for i in range(LIMIT): | |
| print('T{i} = TypeVar(\'T{i}\', bound={bound})'.format(i=i+1, bound=bound)) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env python2 | |
| # | |
| # ARMpwn challenge exploit (kudos & thx to 5aelo) | |
| # | |
| # writeup: https://blahcat.github.io/2016/06/13/armpwn-challenge/ | |
| # | |
| # @_hugsy_ | |
| # | |
| from pwn import * |