Skip to content

Instantly share code, notes, and snippets.

View iAmG-r00t's full-sized avatar
📈
Vulnerability Research - "It's the learning curve for me."

G-r00t iAmG-r00t

📈
Vulnerability Research - "It's the learning curve for me."
View GitHub Profile
@0xor0ne
0xor0ne / ghidra_download_latest.md
Last active January 14, 2024 16:35
One liner for getting the latest Ghidra release

Shell one-liner for downloading the latest Ghidra release and extracting it in ghidra directory:

wget -O ghidra.zip -c \
  "https://github.com/$(wget -O - --quiet \
  https://github.com/NationalSecurityAgency/ghidra/releases/latest | \
  grep 'releases/download/' | sed 's/.*href=..//' | \
  sed 's/".*//' | tail -1)" && unzip -d ghidra-tmp ghidra.zip && \
  mv ghidra-tmp/* ghidra && rm -rf ghidra-tmp ghidra.zip
@alexander-hanel
alexander-hanel / README.md
Last active September 30, 2023 01:20
Learning Rust
@0xswitch
0xswitch / finding_offset.py
Created October 3, 2019 06:28
Find offset for buffer overflow vulnerability with pwntools
from pwn import *
elf = ELF("./vuln")
p = process("./vuln")
p.sendline(cyclic(200, n=8))
p.wait()
core = p.corefile
@amtal
amtal / rappel.py
Last active June 23, 2023 04:03
Rappel.py is a pretty janky assembly REPL. It works by using keystone for R, and GDB for EPL.
""" Assembly REPL in gdb / possible sketchy binary patcher.
Usage:
gdb -q ./target
-x rappel.py adds 'rappel' command
[-write] patches binary on disk, sometimes!
"""
import gdb, tempfile, keystone as ks
class Rappel(gdb.Command):
@scmx
scmx / docker-prompt.md
Last active January 19, 2024 21:36
How to get a fancier bash prompt PS1 inside a docker container #docker #ps1 #emoji

How to get a fancier bash prompt PS1 inside a docker container

Today I wanted to make a recording of me running some commands inside a docker-container.

❯ docker-compose run app bash
root@e9bb2af4dc11:/usr/local/go/src/example.com/dev/project#

Needless to say it looked a bit bland with no colors and a long prompt that prevents me from recording a small terminal and show the full commands I'm