Skip to content

Instantly share code, notes, and snippets.

View hardik05's full-sized avatar

Hardik Shah hardik05

View GitHub Profile
@another-junior-dev
another-junior-dev / image_mod.py
Last active February 26, 2025 17:49
A script to extract images from .zip, .docx, .xlsx, and .pptx
#!/usr/bin/python3
import os
import shutil
import logging
import argparse
import tempfile
from pathlib import Path
from zipfile import ZipFile
@seanjensengrey
seanjensengrey / octal_x86.txt
Last active November 2, 2025 01:44
x86 is an octal machine
# source:http://geocities.com/SiliconValley/heights/7052/opcode.txt
From: mark@omnifest.uwm.edu (Mark Hopkins)
Newsgroups: alt.lang.asm
Subject: A Summary of the 80486 Opcodes and Instructions
(1) The 80x86 is an Octal Machine
This is a follow-up and revision of an article posted in alt.lang.asm on
7-5-92 concerning the 80x86 instruction encoding.
The only proper way to understand 80x86 coding is to realize that ALL 80x86
@kishmakov
kishmakov / Makefile
Last active December 19, 2024 08:44
Shared libraries and Address Sanitizer (ASAN)
SAN_CMP := -fno-omit-frame-pointer -fsanitize=address
SAN_STAT := -static-libstdc++ -static-libasan
BIN_CMP := -std=c++11 -c -I. main.cpp -O -g3 -o main.o
LIB_CMP := -std=c++11 my.cpp -o libmy.so -shared -fPIC -g3
RUN := LD_LIBRARY_PATH=. ASAN_OPTIONS=symbolize=1 ASAN_SYMBOLIZER_PATH=$(shell which llvm-symbolizer)
PRELOAD := LD_PRELOAD=/usr/lib/x86_64-linux-gnu/libasan.so.1
lib-gcc:
@mgeeky
mgeeky / Various-Macro-Based-RCEs.md
Last active July 15, 2025 12:45
Various Visual Basic Macros-based Remote Code Execution techniques to get your meterpreter invoked on the infected machine.

This is a note for myself describing various Visual Basic macros construction strategies that could be used for remote code execution via malicious Document vector. Nothing new or fancy here, just a list of techniques, tools and scripts collected in one place for a quick glimpse of an eye before setting a payload.

All of the below examples had been generated for using as a remote address: 192.168.56.101.

List:

  1. Page substiution macro for luring user to click Enable Content
  2. The Unicorn Powershell based payload
@hewerthomn
hewerthomn / install-oh-my-zsh.sh
Created January 26, 2017 11:30
Offline install of oh-my-zsh on Ubuntu
main() {
# Use colors, but only if connected to a terminal, and that terminal
# supports them.
if which tput >/dev/null 2>&1; then
ncolors=$(tput colors)
fi
if [ -t 1 ] && [ -n "$ncolors" ] && [ "$ncolors" -ge 8 ]; then
RED="$(tput setaf 1)"
GREEN="$(tput setaf 2)"
YELLOW="$(tput setaf 3)"
@rms1000watt
rms1000watt / python-printJS-in-pdf.py
Last active March 29, 2024 11:24
Python script to add JS to pdf so the pdf will print immediately when opened
# IE users need: https://get.adobe.com/reader/
from PyPDF2 import PdfFileWriter, PdfFileReader
output = PdfFileWriter()
ipdf = PdfFileReader(open('old.pdf', 'rb'))
for i in xrange(ipdf.getNumPages()):
page = ipdf.getPage(i)
output.addPage(page)
@mrdaemon
mrdaemon / .tmux-bootstrap.sh
Created July 12, 2011 23:01
tmux config and random bullshit
#!/bin/bash
# Shitty tmux bootstrap script for auto-login and session planning
SESSIONNAME="hack"
hash tmux || { echo "Could not find tmux? Ensure it's in \$PATH" ; exit 1 ;}
check_session() {
tmux list-sessions | cut -d ':' -f '1'| \
egrep "^""$SESSIONNAME""\$" 2>&1 > /dev/null