Skip to content

Instantly share code, notes, and snippets.

Avatar

Anirudh Anand a0xnirudh

View GitHub Profile
View insomnihack2019teaser_droops_writeup.md

The challenge was based on drupal7 with obvious unserialize call added.

Trying to build a chain and the first solution i found was based on following chain:

./includes/bootstrap.inc

abstract class DrupalCacheArray
    ...
    public function __destruct() {
        $data = array();
@a0xnirudh
a0xnirudh / simple-exec-with-docker-remote-api.sh
Created Oct 31, 2017 — forked from dapplebeforedawn/simple-exec-with-docker-remote-api.sh
Using the exec command with the docker API, and capturing output
View simple-exec-with-docker-remote-api.sh
#! /usr/bin/env bash
# Create the container with a long running process. If PID1 exists before
# we send the exec commands, they will fail because the container is not running
#
CONTAINER_NAME="TEST-`uuidgen`"
curl --silent --unix-socket /var/run/docker.sock "http:/containers/create?name=${CONTAINER_NAME}" -XPOST \
-H "Content-Type: application/json" \
-d '{
"Image": "ruby:latest",