Skip to content

Instantly share code, notes, and snippets.

View M0rtale's full-sized avatar
🏠
Working from home

Алан M0rtale

🏠
Working from home
  • Doordash
  • New York, NY
View GitHub Profile
#######################################################################################
# GEF - Multi-Architecture GDB Enhanced Features for Exploiters & Reverse-Engineers
#
# by @_hugsy_
#######################################################################################
#
# GEF is a kick-ass set of commands for X86, ARM, MIPS, PowerPC and SPARC to
# make GDB cool again for exploit dev. It is aimed to be used mostly by exploit
# devs and reversers, to provides additional features to GDB using the Python
# API to assist during the process of dynamic analysis.
This file has been truncated, but you can view the full file.
Listname [index] name : ObjTAG(0x54 INT16)
Tag [1] GPUI Detail Manager (Slice_3_2) : 20013
Tag [2] GPUI Detail Manager (Slice_3_2)-OPTIC : 20013
Tag [3] GPUI Detail Manager (Slice_3_3)-OPTIC : 20013
Tag [4] GPUI Detail Manager (Slice_3_3) : 20013
Tag [5] puddle2 (36) : 20000
Tag [6] puddle2 (33) : 20000
Tag [7] puddle2 (29) : 20000
Tag [8] puddle2 (32) : 20000
#pragma once
unsigned char g_fRubik[] = {
0x00, 0x01, 0x00, 0x00, 0x00, 0x12, 0x01, 0x00, 0x00, 0x04, 0x00, 0x20,
0x44, 0x53, 0x49, 0x47, 0x00, 0x00, 0x00, 0x01, 0x00, 0x01, 0xd2, 0xf8,
0x00, 0x00, 0x00, 0x08, 0x47, 0x44, 0x45, 0x46, 0x09, 0xe3, 0x0b, 0x45,
0x00, 0x00, 0x01, 0x2c, 0x00, 0x00, 0x00, 0x3a, 0x47, 0x50, 0x4f, 0x53,
0x0e, 0x57, 0xe2, 0xcb, 0x00, 0x00, 0x01, 0x68, 0x00, 0x00, 0x6e, 0xb0,
0x47, 0x53, 0x55, 0x42, 0xae, 0x71, 0x47, 0x44, 0x00, 0x00, 0x70, 0x18,
0x00, 0x00, 0x0b, 0x14, 0x4f, 0x53, 0x2f, 0x32, 0x8f, 0x2d, 0xde, 0x51,