Skip to content

Instantly share code, notes, and snippets.

title description date categories slug
QQ协议分析
QQ协议分析
2014-04-16
protocol
qq-protocol

一. 文字聊天协议族(TCPF, Text Chatting Protocol Family)

@0x79H
0x79H / dd.sh
Last active May 17, 2019 11:10
input keyevent 26
sleep 3
am force-stop com.alibaba.android.rimet
sleep 1
am start -n com.android.settings/.wifi.WifiSettings
sleep 5
am start -n com.alibaba.android.rimet/com.alibaba.android.rimet.biz.LaunchHomeActivity
sleep 10
am start -a android.intent.action.VIEW -d dingtalk://dingtalkclient/page/link?url=https://attend.dingtalk.com/attend/index.html
sleep 30
PS D:\Work\hashcat-5.1.0> .\hashcat64.exe -b
hashcat (v5.1.0) starting in benchmark mode...
Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.
* Device #1: WARNING! Kernel exec timeout is not disabled.
This may cause "CL_OUT_OF_RESOURCES" or related errors.
@0x79H
0x79H / hash.md
Created July 15, 2019 09:33
Counter-Strike: Global Offensive
hash dll!function
0x0726774C kernel32.dll!LoadLibraryA
0xA779563A wininet.dll!InternetOpenA
0xC69F8957 wininet.dll!InternetConnectA
0x3B2E55EB wininet.dll!HttpOpenRequestA
0x7B18062D wininet.dll!HttpSendRequestA
0x5DE2C5AA kernel32.dll!GetLastError
0x56A2B5F0 kernel32.dll!ExitProcess
0xE553A458 kernel32.dll!VirtualAlloc
@0x79H
0x79H / all.md
Last active March 7, 2021 11:33
android_so

blinktalk

  • lib_blink_so.so

baidu

  • libBaiduMapSDK_base_v5_3_2.so
  • libBaiduMapSDK_map_v5_3_2.so

ffmpeg

  • libswresample-1.so
  • libswscale-3.so
#include "pch.h"
#include <iostream>
#include <Windows.h>
#include <winternl.h>
#include <psapi.h>
#include <windows.h>
#include <tlhelp32.h>
#include <stdio.h>
@0x79H
0x79H / fun1.1.asm
Created September 24, 2019 04:01
phpstudy
;Accept-Encoding: compress,gzip
.text:100034BE loc_100034BE: ; CODE XREF: sub_100031F0+11A↑j
.text:100034BE BE 50 EC 00 10 mov esi, offset aCompressGzip ; "compress,gzip"
.text:100034C3 8B C7 mov eax, edi
.text:100034C5
.text:100034C5 loc_100034C5: ; CODE XREF: sub_100031F0+2F7↓j
.text:100034C5 8A 10 mov dl, [eax]
.text:100034C7 8A 1E mov bl, [esi]
.text:100034C9 8A CA mov cl, dl
.text:100034CB 3A D3 cmp dl, bl
@0x79H
0x79H / http.c
Created October 23, 2019 03:22
WinHTTP
void test()
{ // 指定http可复用的基本信息
HINTERNET hSession = WinHttpOpen(
_TEXT("MyUA"),
WINHTTP_ACCESS_TYPE_NO_PROXY,
WINHTTP_NO_PROXY_NAME,
WINHTTP_NO_PROXY_BYPASS,
0);
if (!hSession)
{
@0x79H
0x79H / frida-trace.diff
Created December 12, 2019 12:04
frida-trace wait windows process start (ʇıɥs)
diff --git a/frida_tools/application.py b/frida_tools/application.py
index b577be8..82b85b6 100644
--- a/frida_tools/application.py
+++ b/frida_tools/application.py
@@ -232,6 +232,14 @@ class ConsoleApplication(object):
self._reactor.stop()
def _try_start(self):
+ while True:
+ try: