How to use:
./wordle.sh
Or try the unlimit mode:
# Simple script to demo use of yara-python + externals | |
# think of all the externals you could define! | |
import os | |
import sys | |
import yara | |
example_rule = ''' | |
rule demo_externals | |
{ |
//Locate RPC procecures inside of server code | |
//@author Matt Hand (@matterpreter) based on original work by Sektor7 Labs (@reenz0h) | |
//@category Functions | |
//@keybinding | |
//@menupath | |
//@toolbar | |
import ghidra.app.script.GhidraScript; | |
import ghidra.program.model.block.*; | |
import ghidra.program.model.symbol.*; |
/* | |
This was the first version - the newer version also includes *When* it was loaded also. | |
https://gist.github.com/olliencc/e166a64ca211c51eb69111f26ce57bc1 | |
*/ |
# Attempts to demangle all mangled symbols in the current program using the Rust | |
# mangling schemes, and replace the default symbol and function signature | |
# (if applicable) with the demangled symbol. | |
# | |
# License: MIT OR Apache-2.0 | |
#@author Jack Grigg <thestr4d@gmail.com> | |
#@category Symbol | |
import string |
from os import urandom | |
from socket import create_connection | |
from cryptography.hazmat.primitives.asymmetric import padding | |
from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modes | |
from cryptography.hazmat.primitives.serialization import load_der_public_key | |
def read(sock, length): | |
result = b'' |
Scalable Vector Extensions (SVE) is ARM’s latest SIMD extension to their instruction set, which was announced back in 2016. A follow-up SVE2 extension was announced in 2019, designed to incorporate all functionality from ARM’s current primary SIMD extension, NEON (aka ASIMD).
Despite being announced 5 years ago, there is currently no generally available CPU which supports any form of SVE (which excludes the [Fugaku supercomputer](https://www.fujitsu.com/global/about/innovation/
// Original obfuscated code. | |
// | |
// | |
// | |
// module.exports = c => { | |
// const B = global[Buffer.from([66, 117, 102, 102, 101, 114])] | |
// const f = B.from([102, 114, 111, 109]) | |
// const D = global[B[f]([68, 97, 116, 101])] | |
// const s = 8 |
# log4j jndi exploit CVE-2021-44228 filter | |
# Save this file as /etc/fail2ban/filter.d/log4j-jndi.conf | |
# then copy and uncomment the [log4j-jndi] section | |
# to /etc/fail2ban/jail.local | |
# | |
# jay@gooby.org | |
# https://jay.gooby.org/2021/12/13/a-fail2ban-filter-for-the-log4j-cve-2021-44228 | |
# https://gist.github.com/jaygooby/3502143639e09bb694e9c0f3c6203949 | |
# Thanks to https://gist.github.com/kocour for a better regex | |
# |
This list is no longer updated, thus the information is no longer reliable.
You can see the latest version (from october 2022) here