Skip to content

Instantly share code, notes, and snippets.

@thesamesam
thesamesam / xz-backdoor.md
Last active July 25, 2024 09:00
xz-utils backdoor situation (CVE-2024-3094)

FAQ on the xz-utils backdoor (CVE-2024-3094)

This is a living document. Everything in this document is made in good faith of being accurate, but like I just said; we don't yet know everything about what's going on.

Background

On March 29th, 2024, a backdoor was discovered in xz-utils, a suite of software that

@CatoTheYounger97
CatoTheYounger97 / Freespace.md
Last active October 2, 2023 06:00
Freespace Vita button mapping (1, 2, demo)

Freespace Vita Port Button Mapping (1, 2 and Demo):

  • For explaining the gamepad mapping for Freespace vita port.
  • All buttons and combinations can be remapped in game settings (Apart from: START, DPAD RIGHT and DPAD DOWN)
  • Note: Training missions should be skipped as they require keys that are not mapped. This can be done by tapping the "Skip Training" button in the top right of the mission briefing.

Basic Controls:

TOUCHSCREEN             - Mouse Click for Menu Navigation
TRIANGLE                - Lock onto Ship in Reticle 
CIRCLE                  - Fire Secondary Weapon 
@nWestie
nWestie / notallyToQuillPad.py
Last active March 7, 2024 20:34
Transforms a notally backup file into a quillPad one. use at your own risk, it worked for my backup, but I others may differ. Does not deal with note color
import sqlite3
import json
import shutil
import os
tags = []
joins = []
# Tested with Notally v5.2 and QuillPad v1.4.9
# will not preserve note color
@cyxx
cyxx / AW_copy_protection.md
Last active October 2, 2023 05:00
# Delphine Software Another World copy protection sheet

Delphine Software Another World copy protection sheet

AW Copy Protection Sheet

@cyxx
cyxx / deobfuscate_another_exe.py
Created November 5, 2022 14:57
Deobfuscate Another World DOS executable.
#!/usr/bin/env python3
#
# Deobfuscate Another World DOS executable.
#
# The 20kb executable of the game can be divided in three main sections.
#
# 1. From offset 0x20, LZ91 packed data (https://bellard.org/lzexe.html). Each byte is xor'ed with the previous byte.
# 2. Some relocation code that jumps to the LZ91 decompression routine. Each byte of the x86 bytecode is off by 0xD.
# 3. The start code that patches the relocation code.
#
@cyxx
cyxx / OS_copy_protection.md
Created May 6, 2022 14:25
Operation Stealth copy protection sheet

Delphine Software Operation Stealth copy protection sheet

The game bytecode in auto00.prc checks for a subset of all shapes from the card shipped with the game.

[0002] (09) localvars[1] = random(104)
[0006] (0F) SET object[236].costume, localvars[1]

The sheet below contains the 104 shapes that can be requested on game start.

@dmuth
dmuth / convert-files-to-heic-recursive.sh
Last active May 9, 2023 14:44
Shell script to recursively convert JPG and PNG files to HEIC format.
#!/bin/bash
#
# This script will convert JPG and PNG files to HEIC format recursively.
#
# Errors are fatal
set -e
GO=""
DELETE=""
@clach04
clach04 / sjcl_simple
Created March 20, 2022 00:15 — forked from g-p-g/sjcl_simple
SJCL encrypt / decrypt in Python
import os
from base64 import b64decode, b64encode
from cryptography.hazmat.primitives import hashes
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes
from cryptography.hazmat.primitives.kdf.pbkdf2 import PBKDF2HMAC
from cryptography.hazmat.backends import default_backend
_BACKEND = default_backend()
@eatonphil
eatonphil / psql-srv.py
Last active April 28, 2024 09:26 — forked from matteobertozzi/psql-srv.py
postgres "server" wire protocol example (ported python3)
# th30z@u1310:[Desktop]$ psql -h localhost -p 55432
# Password:
# psql (9.1.10, server 0.0.0)
# WARNING: psql version 9.1, server version 0.0.
# Some psql features might not work.
# Type "help" for help.
#
# th30z=> select foo;
# a | b
# ---+---
@kahnwong
kahnwong / aegis_to_tokenvault.py
Created November 26, 2021 07:38
aegis_to_tokenvault.py
import json
import os, glob
filename = glob.glob("*plain*.json")[0]
with open(filename, "r") as f:
d = json.loads(f.read())
data = d["db"]["entries"]
out = []