Skip to content

Instantly share code, notes, and snippets.

View LordNoteworthy's full-sized avatar

Noteworthy LordNoteworthy

View GitHub Profile
@LordNoteworthy
LordNoteworthy / gist:408b2d09321622f1e96d
Created June 21, 2014 22:05
Hackknowledge 2013 Final bin500 CrackMe
import java.util.Scanner;
public class Prism
{
public static final int ROTATE_LEFT = 1;
public static final int ROTATE_RIGHT = 2;
public static int calcmask(int bitstorotate, int direction)
typedef LONG (WINAPI * NtUnmapViewOfSection)(HANDLE ProcessHandle, PVOID BaseAddress);
class runPE{
public:
void run(LPSTR szFilePath, PVOID pFile)
{
PIMAGE_DOS_HEADER IDH;
PIMAGE_NT_HEADERS INH;
PIMAGE_SECTION_HEADER ISH;
PROCESS_INFORMATION PI;
STARTUPINFOA SI;
class Foo (Base):
a = Column(Integer, ForeignKey='sometable.id', primary_key = True)
b = Column(Integer, ForeignKey='other_table.id', primary_key = True)
c = ...
Class Boo (Base):
id = Column(Integer, primary_key = True)
....
// Association table for many to many relationship between A and B
gevent
libevent
greenlet
eventlet
class Sample(Base):
__tablename__ = 'samples'
id = Column(Integer, primary_key=True)
sha256 = Column(String, nullable=False, unique=True, index=True)
gevent
libevent
greenlet
eventlet
class Sample(Base):
__tablename__ = 'samples'
id = Column(Integer, primary_key=True)
sha256 = Column(String, nullable=False, unique=True, index=True)
@LordNoteworthy
LordNoteworthy / restart-vmware.sh
Created September 28, 2019 22:45
restart-vmware
#!/bin/bash
processString=$(ps -ef | grep '[0-9][0-9]:[0-9][0-9]:[0-9][0-9] /usr/bin/vmtoolsd -n vmusr') # get proc$
tokens=( $processString ) # tokenize
kill "${tokens[1]}" # grab pid and kill it
/usr/bin/vmtoolsd -n vmusr & > /dev/null 2>&1 # restart vmtoolsd
### Keybase proof
I hereby claim:
* I am lordnoteworthy on github.
* I am lordnoteworthy (https://keybase.io/lordnoteworthy) on keybase.
* I have a public key ASDtpECLi-LZTEOMHBeEEDXz8LtmB68j7ZuOFC9aUUHpEQo
To claim this, I am signing this object: