⌘T | go to file |
⌘⌃P | go to project |
⌘R | go to methods |
⌃G | go to line |
⌘KB | toggle side bar |
⌘⇧P | command prompt |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
""" | |
extracts the first 18 bytes of the icon header from RT_GROUP_ICON data, | |
appends with a dword value 22 to signify the offset | |
and then appends the raw icon data from RT_ICON | |
""" | |
def extract_icon(pe): | |
""" | |
pe is a pefile object | |
""" | |
rt_string_idx = [entry.id for entry in pe.DIRECTORY_ENTRY_RESOURCE.entries].index(pefile.RESOURCE_TYPE['RT_GROUP_ICON']) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/python | |
# Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford (jspenguin@jspenguin.org) | |
# The author disclaims copyright to this source code. | |
# | |
# Modified slightly by Andreas Thienemann <athienemann@schubergphilis.com> for clearer exploit code | |
# and 64k reads | |
# | |
# This version of the exploit does write received data to a file called "dump" in the local directory | |
# for analysis. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
require 'formula' | |
class LibdnetPython <Formula | |
depends_on 'libdnet' | |
url 'http://libdnet.googlecode.com/files/libdnet-1.12.tgz' | |
homepage 'http://code.google.com/p/libdnet/' | |
sha1 '71302be302e84fc19b559e811951b5d600d976f8' | |
def install | |
ENV["CFLAGS"] = "-O3 -w -pipe" |