Skip to content

Instantly share code, notes, and snippets.

View AmazingTurtle's full-sized avatar
🐢
turtle on SPEED

Felix AmazingTurtle

🐢
turtle on SPEED
View GitHub Profile
@jberkus
jberkus / gist:6b1bcaf7724dfc2a54f3
Last active January 7, 2024 21:26
Finding Unused Indexes
WITH table_scans as (
SELECT relid,
tables.idx_scan + tables.seq_scan as all_scans,
( tables.n_tup_ins + tables.n_tup_upd + tables.n_tup_del ) as writes,
pg_relation_size(relid) as table_size
FROM pg_stat_user_tables as tables
),
all_writes as (
SELECT sum(writes) as total_writes
FROM table_scans
kubectl get pods | grep Evicted | awk '{print $1}' | xargs kubectl delete pod

Deobfuscation

  • Open obfuscated assembly
  • Save module with MD Writed Options / Preserve Heap Offsets && Create Heap Even If Empty ticked ON
  • In same file go to -.ActionTrigger variable StateFalseAnim open \uE000 Token of this will be used to deobfuscate string, 0600???? is an template
  • Go to de4dot program open cmd in that folder and paste string from below withc changed path and token.
de4dot.exe --un-name "!^<>[a-z0-9]$&!^<>[a-z0-9]__.*$&![A-Z][A-Z]\$<>.*$&^[a-zA-Z_<{$][a-zA-Z_0-9<>{}$.`-]*$" "{$DIR}\Assembly-CSharp.dll" --strtyp delegate --strtok {$TOKEN}

to be continued ??