Skip to content

Instantly share code, notes, and snippets.

View debasishm89's full-sized avatar
🎯
Focusing

Debasish Mandal debasishm89

🎯
Focusing
View GitHub Profile
This file has been truncated, but you can view the full file.
try {
/*
Copyright The Closure Library Authors.
SPDX-License-Identifier: Apache-2.0
*/
var f, ba = function(a) {
switch (aa(a)) {
case 4:
case 0:
@debasishm89
debasishm89 / css-sideshow-bob-from-the-simpsons.markdown
Created February 15, 2019 11:08
CSS Sideshow Bob (from The Simpsons)

CSS Sideshow Bob (from The Simpsons)

Sideshow Bob (from The Simpsons) drawn using HTML and CSS

A Pen by Debasish on CodePen.

License.

[+] Attached
[+] Address of PEB : 0x7efde000
[+] Total Number of Process Heaps : 3
[+] Walking 0x3d0000
[+] Heap type : Low Fragmentation Heap
[+] Heap has only 1 segment
[+] Parsing Segment 0x3d0000 of Heap : 0x3d0000
Heap 0x3d0000 Segment : 0x3d0000 Block : 0x3d0000 Size : 0x588 User Pointer : 0x3d0008 ( Busy )
Heap 0x3d0000 Segment : 0x3d0000 Block : 0x3d0588 Size : 0x240 User Pointer : 0x3d0590 ( Busy )
Heap 0x3d0000 Segment : 0x3d0000 Block : 0x3d07c8 Size : 0x20 User Pointer : 0x3d07d0 ( Busy )
@debasishm89
debasishm89 / HeapWalker.py
Last active August 28, 2019 15:30
HeapWalker - Walking Windows 7 process heaps using pydbg
'''
HeapWalker - Walking Windows 7 process heaps using pydbg
Author : Debasish Mandal
Blog :http://www.debasish.in/
Twitter : https://twitter.com/debasishm89
Description : This python script is simplest implementation of Windows HeapWalk() API.
It uses pydbg and allows user to Walk Through debugee process's heaps on the fly.
@debasishm89
debasishm89 / inmemory-ioctl-fuzzer-logger.py
Last active October 30, 2022 16:25
A mutation based usermode dumb IOCTL Fuzzer/Logger. This Python script hooks DeviceIoControl!Kernel32 and try to dump all I/O Control code I/O Buffer pointer, I/O buffer length. It has also the ability to fuzz I/O buffer size,content with junk.
'''
Author : Debasish Mandal
Blog :http://www.debasish.in/
Twitter : https://twitter.com/debasishm89
A mutation based user mode (ring3) dumb in-memory IOCTL Fuzzer/Logger.
This script attach it self to any given process and hooks DeviceIoControl!Kernel32 API and
try to log or fuzz all I/O Control code I/O Buffer pointer, I/O buffer length that
process sends to any Kernel driver.
var tok = window.setInterval(function() {
var total_req = 100;//change it to 200,300 etc..to send request to 200,300 people at a time. May slowdown network
var all = document.getElementsByClassName('vcard-button bt-connect bt-primary')
if (all.length < total_req)
document.body.scrollTop = document.body.scrollHeight;
else{
clearInterval(tok);window.scrollTo(0,0);
for(var i = 0 ; i <= all.length; i++){
all[i].click();}
}}, 2000);
import re
import sys
import pefile
from pydbg import *
from pydbg.defines import *
def parseidalog(file):
all_funcs = []
f = open(file)
funcs = f.readlines()
@debasishm89
debasishm89 / fbxsrf.py
Last active July 24, 2017 09:08
This Burpy (https://github.com/debasishm89/burpy) module is specially written to find CSRF vulnerability in Facebook Application.
from rawweb import *
def main(raw_stream,ssl):
'''
This Burpy module is specially written to find CSRF vulnerability in Facebook Application.
It has already found few minor CSRF vulnerability in FB application. Few them was qualifed for Bug Bounty.
It simply checks whether CSRF token validation is present in Server Side or not by removing token
from request and replaying it.Facebook application always throws a generic error message for CSRF error which is
"Please try closing and re-opening your browser". If this error is not present in response after removing the token
it returns +ve.
'''
@debasishm89
debasishm89 / inlinehookdll.c
Last active October 5, 2019 05:59
DLL code for Inline Hooking MessageBoxW API of User32.dll
#include <windows.h>
__declspec(naked) EvilFunction()
{
/*
0007FA18 01001FC4 Ä. /CALL to MessageBoxW from notepad.01001FBE
0007FA1C 001503C8 È. |hOwner = 001503C8 ('Find',class='#32770',parent=003C029E)
0007FA20 000A3A88 ˆ:.. |Text = "Cannot find "junk""
0007FA24 000A8F34 4.. |Title = "Notepad"
0007FA28 00000040 @... \Style = MB_OK|MB_ICONASTERISK|MB_APPLMODAL
*/
@debasishm89
debasishm89 / peid-poc.py
Last active December 22, 2015 01:08
PEiD 0.95 - Memory Corruption POC
#POC
#c:\python27
junk = "\x41"
header = "MZ"
header += junk * 58
header += "\x80"
header += "\x00" * 3
header += junk * 64
header += "PE"
header += "\x00"*2