Skip to content

Instantly share code, notes, and snippets.

View AxDSan's full-sized avatar
🏠
Working from home

0x90 AxDSan

🏠
Working from home
View GitHub Profile
@AxDSan
AxDSan / windbg-cheat sheet-esp.md
Last active March 19, 2023 00:21
Este documento es una guía de comandos útiles para depurar y analizar aplicaciones .NET utilizando WinDbg y otras herramientas de depuración. Los comandos se dividen en categorías según su función, como comandos de heap y memoria, comandos de depuración y comandos de desensamblaje. También incluye una sección sobre la importancia de conocer tant…

Aquí hay algunos comandos CLR útiles para analizar y depurar aplicaciones .NET. Se pueden usar en varias herramientas de depuración como WinDbg, SOS Debugging Extension y otros.

"Conócete a ti mismo, conoce a tu enemigo. Mil batallas, mil victorias". - Sun Tzu, El Arte de la Guerra

En el contexto de la ingeniería inversa, es importante tener un profundo conocimiento tanto del software que se está analizando como de las técnicas que se utilizan para analizarlo. Solo conociendo ambos se puede esperar superar con éxito los desafíos presentados por la ingeniería inversa.

Comandos de Heap y Memoria

Estos comandos se pueden utilizar para analizar el heap y la memoria del proceso administrado.

@AxDSan
AxDSan / windbg-net-reversing-cheatsheet.md
Created March 18, 2023 16:58
Reversing .NET Assemblies - Useful commands

Reversing .NET using WinDBG

Here are some useful CLR commands for analyzing and debugging .NET applications. They can be used in various debugging tools like WinDbg, SOS Debugging Extension, and others.

Heap and Memory Commands

These commands can be used to analyze the heap and memory of the managed process.

  • !dumpheap : Displays information about objects on the managed heap.
  • Usage: !dumpheap [-stat] [-type ]
@AxDSan
AxDSan / pysleekytmouse.py
Created May 31, 2022 19:56
A small python script to steadily move the mouse when seeking through the scrub bar in YouTube
#! python3
import pyautogui, keyboard, sys
print('Press Ctrl-C to quit.')
try:
while True:
x, y = pyautogui.position()
# if active window contains "youtube"
if keyboard.is_pressed('shift'):
# keep mouse at the same position
@AxDSan
AxDSan / b4a-character-counter.js
Created March 16, 2022 20:41
B4a Character Counter in Replies
// ==UserScript==
// @name B4A
// @namespace http://tampermonkey.net/
// @version 0.1
// @description Simply gets the characters count towards a message
// @author 0x90
// @match https://*.board4all.biz/*
// @icon https://www.google.com/s2/favicons?sz=64&domain=board4all.biz
// @grant none
// @require https://code.jquery.com/jquery-3.6.0.slim.min.js
@AxDSan
AxDSan / Getting Started with RedwoodJS and Railway.md
Last active October 21, 2021 20:54
Getting Started with RedwoodJS and Railway

1. Create a RedwoodJS project

yarn create redwood-app javascript-jam-redwood
cd javascript-jam-redwood
yarn rw dev

Open localhost:8910

Create home page

@AxDSan
AxDSan / e.js
Last active April 17, 2020 23:36
AdRegain Intrusive Anti-AdBlock Script (Beautified)
(function (i, l) {
var v = function (d) {
var b = 1364972901;
var g = d.split("g")
.filter(Boolean)
.map(function (d) {
return String.fromCharCode(parseInt(d, 16) ^ b)
})
.join("");
return c(g)
@AxDSan
AxDSan / dotnet-3.0-preview7
Created July 29, 2019 21:12
A one-liner to install dotnet-3.0-preview7 in Ubuntu/Debian based systems :D
cd $HOME/Downloads && mkdir preview7 && cd preview7 && wget -c https://download.visualstudio.microsoft.com/download/pr/75df8900-3c7c-4c83-a142-ac464aba5424/2b9621b80f3e6777d436f6aabaaced27/dotnet-host-3.0.0-preview7-27912-14-x64.deb && wget -c https://download.visualstudio.microsoft.com/download/pr/14afe93a-0608-455f-835d-21bad58b79c5/0bdf5dea07ed8b2724a4a9b4f2e291c5/dotnet-hostfxr-3.0.0-preview7-27912-14-x64.deb && wget -c https://download.visualstudio.microsoft.com/download/pr/e091a028-ba39-4fa7-b67e-ea94cc17c796/486715c7f03753721d3e36eb2802b78a/dotnet-runtime-3.0.0-preview7-27912-14-x64.deb && wget -c https://download.visualstudio.microsoft.com/download/pr/24905020-03ea-4cfc-9362-c48067865fb1/9bf81548b0121de0e92565d99b2680c0/aspnetcore-runtime-3.0.0-preview7.19365.7-x64.deb && wget -c https://download.visualstudio.microsoft.com/download/pr/0262539c-3137-4a86-9df4-f82896d16317/d8756586ecd9f55097d89f45de523059/dotnet-targeting-pack-3.0.0-preview7-27912-14-x64.deb && wget -c https://download.visualstudio.micr
@AxDSan
AxDSan / dotnetcore-3.0-preview6
Created July 23, 2019 14:54
A one liner to Install .NET Core 3.0 Preview6 in Ubuntu/Debian based systems :D
cd $HOME/Downloads && mkdir dotnet-preview6 && cd dotnet-preview6 && wget -c https://download.visualstudio.microsoft.com/download/pr/af083813-ec86-4e18-b386-c7f89f013432/da18a8397fff81a07871a8a5840066e2/dotnet-runtime-deps-3.0.0-preview6-27804-01-x64.deb && wget -c https://download.visualstudio.microsoft.com/download/pr/8c70f3b5-1866-4969-8acf-303ce1a5412a/c75e23e6f50d597e3b3b86bb672a6ab2/dotnet-host-3.0.0-preview6-27804-01-x64.deb && wget -c https://download.visualstudio.microsoft.com/download/pr/f62d3861-6142-4150-9e93-868099ca0502/35ba5215c361b923409f304e3771a593/dotnet-hostfxr-3.0.0-preview6-27804-01-x64.deb && wget -c https://download.visualstudio.microsoft.com/download/pr/b85699ae-e447-4b54-a6fe-537c9426ac0c/25f6576bb4d7ac649b733d0fb25bbaf6/dotnet-runtime-3.0.0-preview6-27804-01-x64.deb && wget -c https://download.visualstudio.microsoft.com/download/pr/e3500e27-3aed-4c7a-a241-627dd33fda85/2f56e6bbf0e55b32dba9520c2426db51/aspnetcore-runtime-3.0.0-preview6.19307.2-x64.deb && wget -c https://download.visua
@AxDSan
AxDSan / omz.zshrc
Created July 12, 2019 21:07
OH-MY-ZSH Configuration Stuff After a Clean Installation
ZSH_THEME="powerlevel9k/powerlevel9k"
POWERLEVEL9K_MODE="nerdfont-complete"
POWERLEVEL9K_DISABLE_PROMPT=true
POWERLEVEL9K_PROMPT_ON_NEWLINE=true
POWERLEVEL9K_MULTILINE_LAST_PROMPT_PREFIX="▶ "
POWERLEVEL9K_MULTILINE_FIRST_PROMPT_PREFIX=""
POWERLEVEL9K_LEFT_PROMPT_ELEMENTS=(custom_user_icon dir vcs)
Verifying my Blockstack ID is secured with the address 16hiSA5U5JaH6u7ZNz8MhdErpa1Gfd8Ygd https://explorer.blockstack.org/address/16hiSA5U5JaH6u7ZNz8MhdErpa1Gfd8Ygd