Skip to content

Instantly share code, notes, and snippets.

View 0xswitch's full-sized avatar
🏴
rooting some virtual beer

Switch 0xswitch

🏴
rooting some virtual beer
View GitHub Profile
<?xml version="1.0" encoding="utf-8"?>
<package>
<component
id="uteeshohbo8rair6iuMauTohvologh">
<registration
description="uteeshohbo8rair6iuMauTohvologh"
progid="uteeshohbo8rair6iuMauTohvologh"
version="1.00"
remotable="True"></registration>
<script
// Decompiled with JetBrains decompiler
// Type: AingeiRai5HahfeiThe2
// Assembly: AingeiRai5HahfeiThe2, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null
// MVID: 3B6074DF-714F-4105-BC14-49801EE8A52C
// Assembly location: C:\Users\switch\Desktop\NDH16\extract.exe
using System;
using System.Diagnostics;
using System.Drawing;
using System.Runtime.InteropServices;
@0xswitch
0xswitch / milnetv2.c
Created June 3, 2018 21:00
milnetv2.c
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <string.h>
#define BUFFER_SIZE 512
void print_image()
{
char buffer[BUFFER_SIZE];
@0xswitch
0xswitch / finding_offset.py
Created October 3, 2019 06:28
Find offset for buffer overflow vulnerability with pwntools
from pwn import *
elf = ELF("./vuln")
p = process("./vuln")
p.sendline(cyclic(200, n=8))
p.wait()
core = p.corefile
@0xswitch
0xswitch / ssti_pattern_finder.py
Created May 1, 2023 17:10
python SSTI/string format pattern finder
class Search:
def __init__(self, obj, pattern, depth):
self.max_depth = depth
self.pattern = pattern
self.visited_clss = []
self.visited_objs = []
self.search(obj)