Skip to content

Instantly share code, notes, and snippets.

View OlivierLaflamme's full-sized avatar
:shipit:
؁؁؁؁؁؁؁؁؁؁؁؁؁؁🏴 403 Forbidden؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁🚩؁؁؁؁؁؁؁؁؁

Boschko OlivierLaflamme

:shipit:
؁؁؁؁؁؁؁؁؁؁؁؁؁؁🏴 403 Forbidden؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁؁🚩؁؁؁؁؁؁؁؁؁
View GitHub Profile
@OlivierLaflamme
OlivierLaflamme / validat_w_curl.sh
Last active April 10, 2024 18:08
validate domain before subfinder on scope just `cat output.txt| cut -d':' -f1 | sort | uniq`
#!/bin/bash
# Define the function to check web application for a domain
check_domain() {
domain=$1
echo "$domain"
response=$(curl -sL -w "%{http_code}\\n" "$domain" -o /dev/null)
if [ "$response" != "000" ]; then
echo "$domain: $response"
echo "$domain: $response" >> output.txt
@OlivierLaflamme
OlivierLaflamme / fuck_bdl.py
Created March 7, 2024 03:05
fuck this this waste of a god damn day
import os
import struct
# Constants
START_OF_DICT = 0x11d
PARTITION_TABLE_START = 0x929
PARTITION_NAME_OFFSET = 0x21c
DICT_RECORDS_START = 0x43d
DICT_RECORD_SIZE = 0x114
BDL_RECORD_NAME_LEN = 0x100
[13088.506133] int3: 0000 [#1] SMP
[13088.524203] last sysfs file: /sys/module/vt/parameters/default_utf8
[13088.544028] Modules linked in:
[13088.562724]
[13088.580913] Pid: 3469, comm: Xnest Not tainted (2.6.32 #19) VMware Virtual Platform
[13088.619038] EIP: 0060:[<f7d02001>] EFLAGS: 00200283 CPU: 0
[13088.638601] EIP is at 0xf7d02001
[13088.657447] EAX: 00000053 EBX: deadbeef ECX: 00000007 EDX: 000000e0
[13088.676627] ESI: bffffcf0 EDI: 00000000 EBP: f6758000 ESP: f6759fb0
[13088.696022] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068
import json
import re
import requests
import sys
import os
headers = {
"User-Agent": "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.90 Safari/537.36"}
fileurl=sys.argv[1]
from pwn import *
context(arch='mips', os='linux', log_level='debug')
file_name = './exp'
debug = 0
if debug:
r = remote()
else:
@OlivierLaflamme
OlivierLaflamme / mips_pwndbg.txt
Created January 23, 2023 14:48
stack based bod in mips
from pwn import *
context(arch= 'mips' , os= 'linux' , log_level= 'debug' )
file_name = './exp'
debug = 0
if debug:
r = remote()
else :
@OlivierLaflamme
OlivierLaflamme / start-mipsel.sh
Created January 19, 2023 23:55
setup for qemu
#set network
sudo brctl addbr virbr0
sudo ifconfig virbr0 192.168.5.1/24 up
sudo tunctl -t tap0
sudo ifconfig tap0 192.168.5.11/24 up
sudo brctl addif virbr0 tap0
qemu-system-mips -M malta -kernel vmlinux-3.2.0-4-4kc-malta -hda debian_wheezy_mips_standard.qcow2 -append "root=/dev/sda1" -netdev tap,id=tapnet,ifname=tap0,script=no -device rtl8139,netdev=tapnet -nographic
@OlivierLaflamme
OlivierLaflamme / calls.cs
Last active April 26, 2023 04:16
C# code that sets up an x64 syscall stub as a byte array, allocate that stub into memory, replace the syscall ID with a user-defined one, create a delegate for the stub, and then execute the syscall
using System;
using System.Runtime.InteropServices;
namespace SyscallStub
{
// Define the syscall stub as a byte array
static readonly byte[] syscallStub = new byte[] {
0x48, 0x31, 0xc0, // xor rax, rax
0x48, 0xbb, 0x01, 0x00, 0x00, 0x00, 0x00, // mov rbx, user-defined syscall ID
0x0f, 0x05 // syscall
@OlivierLaflamme
OlivierLaflamme / google_lure.py
Created December 1, 2022 03:18 — forked from ustayready/google_lure.py
Generate phishing lures that exploit open-redirects from www.google.com using Google Docs
from __future__ import print_function
import pickle
import os.path
from googleapiclient.discovery import build
from google_auth_oauthlib.flow import InstalledAppFlow
from google.auth.transport.requests import Request
from apiclient import errors
import re
from bs4 import BeautifulSoup as Soup
#!/usr/bin/env python3
"""
How to use:
Run this script out of /tmp in a seperate cmd (CMD-A)
leave this running CRTL+C if you want to kill it of `ps aux` find the PID the `kill -9 [PID]`
Step1: chmod +x peuse_cpu_crash.py
Step2: python3 peuse_cpu_crash.py