Skip to content

Instantly share code, notes, and snippets.

🍎
Security Black Technology

JoyChou JoyChou93

🍎
Security Black Technology
Block or report user

Report or block JoyChou93

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
@JoyChou93
JoyChou93 / watermark.js
Last active Sep 29, 2018
watermark 水印
View watermark.js
```javascript
function checkWaterStatus(domain){
var otdiv = document.getElementById('joychou');
if(!otdiv) {
watermark.load({watermark_txt: domain})
watermark.load({watermark_txt: domain, watermark_x:100, watermark_y:100, watermark_alpha: 0.01})
}
}
// 定时器
View dirty.c
//
// This exploit uses the pokemon exploit of the dirtycow vulnerability
// as a base and automatically generates a new passwd line.
// The user will be prompted for the new password when the binary is run.
// The original /etc/passwd file is then backed up to /tmp/passwd.bak
// and overwrites the root account with the generated line.
// After running the exploit you should be able to login with the newly
// created user.
//
// To use this exploit modify the user values according to your needs.
@JoyChou93
JoyChou93 / Curl.php
Last active Oct 12, 2017
修复Typecho SSRF的Curl.php代码 代码路径var/Typecho/Http/Client/Adapter/Curl.php
View Curl.php
<?php
if (!defined('__TYPECHO_ROOT_DIR__')) exit;
/**
* CURL适配器
*
* @author qining
* @category typecho
* @package Http
* @copyright Copyright (c) 2008 Typecho team (http://www.typecho.org)
* @license GNU General Public License 2.0
@JoyChou93
JoyChou93 / Socket.php
Created Oct 12, 2017
修复Typecho SSRF的Socket.php代码 代码路径var/Typecho/Http/Client/Adapter/Socket.php
View Socket.php
<?php
if (!defined('__TYPECHO_ROOT_DIR__')) exit;
/**
* Socket适配器
*
* @author qining
* @category typecho
* @package Http
* @copyright Copyright (c) 2008 Typecho team (http://www.typecho.org)
* @license GNU General Public License 2.0
You can’t perform that action at this time.