References: https://twitter.com/cyb3rops/status/1499514240008437762 https://twitter.com/GossiTheDog/status/1499781976835993600
More background: https://twitter.com/FuzzySec/status/1499462430275084307
console.log("[*] SSL Pinning Bypasses"); | |
console.log(`[*] Your frida version: ${Frida.version}`); | |
console.log(`[*] Your script runtime: ${Script.runtime}`); | |
/** | |
* by incogbyte | |
* Common functions | |
* thx apkunpacker, NVISOsecurity, TheDauntless | |
* Remember that sslpinning can be custom, and sometimes u need to reversing using ghidra,IDA or something like that. | |
* !!! THIS SCRIPT IS NOT A SILVER BULLET !! |
I recently experienced this problem, but I only had answers that did not help. Then, I was able to get a hint from the short opinion of the Linux Forum.
This problem is related to the change of the drive. If it is not properly reflected in /etc/fstab
, such an error may occur.
Download SystemRescueCD and make a bootdisk: https://www.system-rescue.org/
FDISK and MOUNT
using System; | |
using System.Runtime.CompilerServices; | |
using System.Runtime.InteropServices; | |
using System.Security; | |
namespace ProcessMemoryTest.Native | |
{ | |
[SuppressUnmanagedCodeSecurity] | |
public static unsafe class Kernel32 | |
{ |
#!usr/bin/env python | |
# -*- coding: utf-8 -*- | |
""" | |
@author:000000 | |
@file: opt_enum | |
@time: 2018/10/11 | |
""" | |
import idaapi |
The following Lua program generates a Lua bytecode program called lua-sandbox-rce.luac
, which in turn spawns a shell from within Lua 5.1 sandbox. The remainder of this document attempts to explain how this program works by a whirlwind tour of relevent bits of the Lua 5.1 virtual machine.
function outer()
local magic -- In bytecode, the stack slot corresponding to this local is changed
local function middle()
local co, upval
local ub1 = {[0] = -- Convert uint8_t to char[1]
/** | |
* snoopy.c - Snoop on another tasks memory. | |
* Fergus In London <fergus@fergus.london> | |
* | |
* This is a pretty basic demo of the process_vm_readv syscall, a syscall which | |
* provides a nicer interface than ptrace for accessing memory used by another | |
* task. | |
* | |
* To play with simply use `ps` to get a PID for the process you'd like to snoop | |
* on, and `pmap` for the relevant memory address. |
-- | |
-- RSA Encryption/Decryption Library | |
-- By 1lann | |
-- | |
-- Refer to license: http://pastebin.com/9gWSyqQt | |
-- | |
-- See gists comment at the bottom of the page for FAQ and updates! | |
-- | |
-- |
CURLOPT_NOTHING = 0; | |
CURLOPT_FILE = 10001; | |
CURLOPT_URL = 10002; | |
CURLOPT_PORT = 3; | |
CURLOPT_PROXY = 10004; | |
CURLOPT_USERPWD = 10005; | |
CURLOPT_PROXYUSERPWD = 10006; | |
CURLOPT_RANGE = 10007; | |
CURLOPT_INFILE = 10009; | |
CURLOPT_ERRORBUFFER = 10010; |
/** | |
* Simple JavaScript tokenizer (not a full parser!!!) | |
* | |
* Portions taken from Narcissus by Brendan Eich <brendan@mozilla.org>. | |
*/ | |
/*jshint evil: true, regexdash: false, regexp: false */ | |
var KEYWORDS = [ | |
'break', |