Skip to content

Instantly share code, notes, and snippets.

@mokhdzanifaeq
mokhdzanifaeq / inject.php
Last active February 20, 2022 00:06
inject javascript into images (BMP,JPG,GIF)
<?php
//GIF && BMP
function GNB($data, $payload, $pos) {
$data = str_replace(['2f2a', '2a2f'], '0000', $data);
$data = substr_replace($data, '2f2a', $pos, 4);
$data .= array_shift( unpack('H*', '*/=1;' . $payload) );
@mokhdzanifaeq
mokhdzanifaeq / brute.php
Last active November 13, 2015 09:12
bruteforce tm riger
<?php
$ip = 'x.x.x.x';
$thread = 15;
$timeout = 10;
$proxy = false;
$start = 0x0;
$retry = 3;
$hex = array_map(function ($x) { return sprintf('%04X', $x); }, range($start, 0xffff) );
from z3 import *
from random import shuffle
# define the variables
chars = IntVector("", 16)
solver = Solver()
# all values are printable chararacters (33 - 126)
for i in range(16):
@mokhdzanifaeq
mokhdzanifaeq / keygen.py
Last active March 27, 2016 12:40
keygen for challenge3
# challenge3 - https://drive.google.com/file/d/0B_bQeUUGe4uLM3BWd1dqTVF4TVE/view?usp=sharing
from z3 import *
import sys
# define the variables
chars = IntVector("", 7)
solver = Solver()
constraint = []
@mokhdzanifaeq
mokhdzanifaeq / keygen.py
Last active April 13, 2016 08:15
keygen for challenge4_ok using Z3 theorem prover
# challenge4_ok.exe - https://drive.google.com/open?id=0B_bQeUUGe4uLcXNqRnBBand5Yk0
from z3 import *
import sys
# argv[1] == key length
length = int(sys.argv[1])
if length < 5:
print "length must be more than 4!"
exit()
@mokhdzanifaeq
mokhdzanifaeq / extract.rb
Created November 23, 2016 13:06
extract keystroke from buffer data [metasploit]
// extracted from metasploit source code
// need to get hex stream of the buffer
VirtualKeyCodes = {
1 => %W{ LClick },
2 => %W{ RClick },
3 => %W{ Cancel },
4 => %W{ MClick },
8 => %W{ Back },
9 => %W{ Tab },
@mokhdzanifaeq
mokhdzanifaeq / extract.py
Last active July 4, 2023 03:30
extract data embeded in pixel channels
from PIL import Image
import argparse
from collections import OrderedDict
def parseMask(string):
mask = []
for val in string.split(","):
if "-" in val:
min, max = val.split("-")
mask += [1 << (i - 1) for i in range(int(min), int(max) + 1)]
@mokhdzanifaeq
mokhdzanifaeq / regex.py
Last active June 12, 2017 07:46
satisfying regular expression using smt solver
import re
import sys
import string
from z3 import *
# hackish way to generate string that satisfy simple regex
# what's not supported: group reference & look behind
# usage: python regex.py PATTERN LENGTH
pattern = sys.argv[1]
@mokhdzanifaeq
mokhdzanifaeq / bot.py
Created February 12, 2018 11:00
google form bot with weighted answer
import os,sys
import requests
import re
import ast
import json
import time
from numpy.random import choice
loop = 102
@mokhdzanifaeq
mokhdzanifaeq / brute.py
Last active November 26, 2018 20:47
multithreaded hidden tear bruteforcer. start from the defined tick and decrease from there
# pip install pycryptodome
from Crypto.Protocol.KDF import PBKDF2
from Crypto.Cipher import AES
from hashlib import sha256
from datetime import datetime
from ctypes import *
import multiprocessing as mp
# http://referencesource.microsoft.com/#mscorlib/system/random.cs
class Random(object):