IERAE CTF had one of the coolest pwn challenges I've done in the while. It was written by hugeh0ge.
Here's the full source:
// gcc chal.c -fno-stack-protector -static -o chal
#include <stdio.h>
#include IERAE CTF had one of the coolest pwn challenges I've done in the while. It was written by hugeh0ge.
Here's the full source:
// gcc chal.c -fno-stack-protector -static -o chal
#include <stdio.h>
#include V8 is Google’s open source high-performance JavaScript and WebAssembly engine, written in C++. It is used in Chrome and in Node.js, among others. It implements ECMAScript and WebAssembly, and runs on Windows 7 or later, macOS 10.12+, and Linux systems that use x64, IA-32, ARM, or MIPS processors. V8 can run standalone, or can be embedded into any C++ application.
SpiderMonkey is Mozilla’s JavaScript and WebAssembly Engine, used in Firefox, Servo and various other projects. It is written in C++, Rust and JavaScript. You can embed it into C++ and Rust projects, and it can be run as a stand-alone shell. It can also be [compiled](https://bytecodealliance.org/articles/making-javascript-run-fast-on
| ! Feed | |
| www.reddit.com##shreddit-feed | |
| ! Top carousel | |
| www.reddit.com##shreddit-gallery-carousel | |
| ! Recommended posts in sidebar | |
| www.reddit.com##reddit-pdp-right-rail-post |
| package org.mapleir; | |
| import org.mapleir.app.client.SimpleApplicationContext; | |
| import org.mapleir.app.service.ApplicationClassSource; | |
| import org.mapleir.app.service.InstalledRuntimeClassSource; | |
| import org.mapleir.asm.ClassHelper; | |
| import org.mapleir.asm.ClassNode; | |
| import org.mapleir.asm.MethodNode; | |
| import org.mapleir.context.AnalysisContext; | |
| import org.mapleir.context.BasicAnalysisContext; |
| Implementation notes regarding ADB. | |
| I. General Overview: | |
| The Android Debug Bridge (ADB) is used to: | |
| - keep track of all Android devices and emulators instances | |
| connected to or running on a given host developer machine | |
| - implement various control commands (e.g. "adb shell", "adb pull", etc.) |
This Tinyscript-based tool allows to apply steganography based on PVD (Pixel Value Differencing) in order to retrieve hidden data from an image.
$ pip install tinyscript
$ tsm install stegopvd
| # https://securitychops.com/2019/08/31/dev/random/one-liner-to-install-burp-cacert-into-android.html | |
| # | |
| curl --proxy http://127.0.0.1:8080 -o cacert.der http://burp/cert \ | |
| && openssl x509 -inform DER -in cacert.der -out cacert.pem \ | |
| && cp cacert.der $(openssl x509 -inform PEM -subject_hash_old -in cacert.pem |head -1).0 \ | |
| && adb root \ | |
| && adb remount \ | |
| && adb push $(openssl x509 -inform PEM -subject_hash_old -in cacert.pem |head -1).0 /sdcard/ \ | |
| && echo -n "mv /sdcard/$(openssl x509 -inform PEM -subject_hash_old -in cacert.pem |head -1).0 /system/etc/security/cacerts/" | adb shell \ | |
| && echo -n "chmod 644 /system/etc/security/cacerts/$(openssl x509 -inform PEM -subject_hash_old -in cacert.pem |head -1).0" | adb shell \ |
| /***************************************************************************/ | |
| /* Godot PCK extractor (pckext.cpp) */ | |
| /***************************************************************************/ | |
| /* This program is free software: you can redistribute it and/or modify */ | |
| /* it under the terms of the GNU General Public License as published by */ | |
| /* the Free Software Foundation, either version 3 of the License, or */ | |
| /* (at your option) any later version. */ | |
| /* */ | |
| /* This program is distributed in the hope that it will be useful, */ | |
| /* but WITHOUT ANY WARRANTY; without even the implied warranty of */ |
ASCI art characters for creating diagrams