Skip to content

Instantly share code, notes, and snippets.

View 0x4E0x650x6F's full-sized avatar

0x4E0x650x6F 0x4E0x650x6F

View GitHub Profile
@0x4E0x650x6F
0x4E0x650x6F / build.bat
Created February 1, 2021 14:16 — forked from fsmv/build.bat
Loading and executing code directly from an obj file on Windows!
@echo off
rem Set up the Visual Studio 2013 compiler environment variables
call "C:\Program Files (x86)\Microsoft Visual Studio 12.0\VC\vcvarsall.bat" x64
cl -c lib.cpp
cl runner.cpp /link user32.lib
@0x4E0x650x6F
0x4E0x650x6F / pdns.service
Created January 18, 2021 12:03
PowerDNS service start fix pdns-server 4.2.1-1build2
--- original service config ---
[Unit]
Description=PowerDNS Authoritative Server
Documentation=man:pdns_server(1) man:pdns_control(1)
Documentation=https://doc.powerdns.com
Wants=network-online.target
After=network-online.target mysqld.service postgresql.service slapd.service mariadb.service
[Service]
ExecStart=/usr/sbin/pdns_server --guardian=no --daemon=no --log-timestamp=no --disable-syslog --write-pid=no
@0x4E0x650x6F
0x4E0x650x6F / petstore_exp.py
Last active December 13, 2018 18:04
exploit petstore
#!/usr/bin/python
from pwn import *
import sys
strlen_got = 0x602040
exit_got = 0x602070
from struct import *
offsets = [
import re
import unittest
class LogParser(object):
"""
Some the regular expressions are 'based' on Django's
Validators
"""
IPV4_RE = (r"(?:25[0-5]|2[0-4]\d|[0-1]?\d?\d)"