Skip to content

Instantly share code, notes, and snippets.

View awakened1712's full-sized avatar

awakened awakened1712

View GitHub Profile
@awakened1712
awakened1712 / tmate_for_ssh.md
Created January 15, 2024 13:30 — forked from iskolbin/tmate_for_ssh.md
Ubuntu(systemd) tmate service for ssh

The motivation is: ssh to remote computer without port forwading, dynamic DNS and so on, the only thing needed is that the remote is connected to the Internet.

  1. On remote get tmate, put it in /usr/local/bin (apt version as of 18.04LTS is too old):
curl -L https://github.com/tmate-io/tmate/releases/download/2.4.0/tmate-2.4.0-static-linux-amd64.tar.xz|tar xJv
sudo mv tmate-2.4.0-static-linux-amd/tmate /usr/local/bin
  1. Put public keys in ~/.ssh/authorized_keys
@awakened1712
awakened1712 / tmate_for_ssh.md
Created January 15, 2024 13:28 — forked from nitz/tmate_for_ssh.md
Ubuntu(systemd) tmate service for ssh

The motivation is: ssh to remote computer without port forwading, dynamic DNS and so on, the only thing needed is that the remote is connected to the Internet.

  1. On remote get tmate, put it in /usr/local/bin (apt version as of 18.04LTS is too old):
curl -L https://github.com/tmate-io/tmate/releases/download/2.4.0/tmate-2.4.0-static-linux-amd64.tar.xz|tar xJv
sudo mv tmate-2.4.0-static-linux-amd/tmate /usr/local/bin
  1. Put public keys in ~/.ssh/authorized_keys
@awakened1712
awakened1712 / valgrind_android_build.sh
Last active December 12, 2018 11:08 — forked from truebit/valgrind_android_build.sh
Valgrind 3.12.0 cross compile on Android
#!/bin/sh
export NDKROOT=/home/notroot/android-ndk-r17b
#ndk root now could be installed in Android SDK manager/Extras/NDK Bundle; should be $ANDROID_HOME/ndk_bundle
echo "NKDROOT: " $NDKROOT
export ANRDOID_TOOLCHAIN="arm-linux-androideabi-4.9"
# Set up toolchain paths.
#
# For ARM
@awakened1712
awakened1712 / eternal-blue.py
Created March 23, 2018 12:32
Eternal Blue exploit
#!/usr/bin/python
from impacket import smb, smbconnection
from mysmb import MYSMB
from struct import pack, unpack, unpack_from
import sys
import socket
import time
'''
MS17-010 exploit for Windows 2000 and later by sleepya
@awakened1712
awakened1712 / Hook.java
Created March 16, 2018 07:37
Xposed hook encrypted class
import de.robv.android.xposed.IXposedHookLoadPackage;
import de.robv.android.xposed.XC_MethodHook;
import de.robv.android.xposed.XposedBridge;
import de.robv.android.xposed.XposedHelpers;
import de.robv.android.xposed.callbacks.XC_LoadPackage.LoadPackageParam;
import static de.robv.android.xposed.XposedHelpers.findAndHookMethod;
public class Hook implements IXposedHookLoadPackage {
@Override
@awakened1712
awakened1712 / hook_native.py
Created March 9, 2018 17:51
Frida spawn Android app + hook native function
import frida, sys
ss = """
Interceptor.attach(Module.findExportByName(null, "dlopen"), {
onEnter: function (args) {
this.path = Memory.readUtf8String(args[0]);
},
onLeave: function (retval) {
if(!retval.isNull() && this.path.includes('libtest.so')) {
var fstatat = resolveAddress('libtest.so', '0x0', '0x17FEB5');