This is an exploit for HoleyBeep.
To use it, place any command you want root to execute in /tmp/x
.
$ cat /tmp/x
echo PWNED $(whoami)
- (UIImage *)dynamicImage | |
{ | |
UITraitCollection *const baseTraitCollection = /* an existing trait collection */; | |
UITraitCollection *const lightTraitCollection = [UITraitCollection traitCollectionWithTraitsFromCollections:@[baseTraitCollection, [UITraitCollection traitCollectionWithUserInterfaceStyle:UIUserInterfaceStyleLight]]]; | |
UITraitCollection *const purelyDarkTraitCollection = [UITraitCollection traitCollectionWithUserInterfaceStyle:UIUserInterfaceStyleDark]; | |
UITraitCollection *const darkTraitCollection = [UITraitCollection traitCollectionWithTraitsFromCollections:@[baseTraitCollection, purelyDarkTraitCollection]]; | |
__block UIImage *lightImage; | |
[lightTraitCollection performAsCurrentTraitCollection:^{ | |
lightImage = /* draw image */; |
// based on ian beer's code | |
// just use https://github.com/bazad/x18-leak , it's way cleaner | |
// by stek29 | |
// see bazad's writeup: http://bazad.github.io/2018/04/kernel-pointer-crash-log-ios | |
#if 0 | |
From https://gist.github.com/stek29/e68e9eae382b975093252d6117b6b501 | |
Finding Lel0_synchronous_vector_64_long: |
#!/bin/bash | |
ITERATION=1 | |
EXTENSION="mp4" | |
FILENAME="$HOME/Desktop/Simulator Recording.$EXTENSION" | |
while [ -e "$FILENAME" ] | |
do | |
ITERATION=$((ITERATION+1)) | |
FILENAME="$HOME/Desktop/Simulator Recording $ITERATION.$EXTENSION" |
00:0A:F5:66:C2:A4 | |
04:B1:67:B5:87:F1 | |
28:ED:6A:87:D4:A6 | |
38:F2:3E:8F:69:20 | |
58:48:22:45:6B:FC | |
80:EA:96:4A:02:C4 | |
8C:8E:F2:7C:FD:90 | |
98:00:C6:33:B3:66 | |
B0:E5:ED:9A:8B:9F | |
D8:5B:2A:B1:1E:A3 |
public class Channel<Value> { | |
private class Subscription { | |
weak var object: AnyObject? | |
private let notifyBlock: (Value) -> Void | |
private let queue: DispatchQueue | |
var isValid: Bool { | |
return object != nil |
admin account info" filetype:log | |
!Host=*.* intext:enc_UserPassword=* ext:pcf | |
"# -FrontPage-" ext:pwd inurl:(service | authors | administrators | users) "# -FrontPage-" inurl:service.pwd | |
"AutoCreate=TRUE password=*" | |
"http://*:*@www” domainname | |
"index of/" "ws_ftp.ini" "parent directory" | |
"liveice configuration file" ext:cfg -site:sourceforge.net | |
"parent directory" +proftpdpasswd | |
Duclassified" -site:duware.com "DUware All Rights reserved" | |
duclassmate" -site:duware.com |
function logColor(color, args) { | |
console.log(`%c ${args.join(' ')}`, `color: ${color}`); | |
} | |
const log = { | |
aliceblue: (...args) => { logColor('aliceblue', args)}, | |
antiquewhite: (...args) => { logColor('antiquewhite', args)}, | |
aqua: (...args) => { logColor('aqua', args)}, | |
aquamarine: (...args) => { logColor('aquamarine', args)}, | |
azure: (...args) => { logColor('azure', args)}, |
#include <stdio.h> | |
#include <stdlib.h> | |
#include <stdint.h> | |
#ifdef _MSC_VER | |
#include <intrin.h> /* for rdtscp and clflush */ | |
#pragma optimize("gt",on) | |
#else | |
#include <x86intrin.h> /* for rdtscp and clflush */ | |
#endif |
# THIS IS PROVIDED WITHOUT ANY WARRANTY EXPLICIT OR IMPLICIT | |
# THE AUTHORS ARE NOT RESPONSIBLE FOR ANY SECURITY ISSUES OR FINANCIAL LOSSES | |
# Installing requirements: pip install python-bittrex | |
# Then, change the next two lines with your Bittrex API info (with limit order & view info access) | |
BITTREX_PUBLIC = "INSERT BITTREX PUBLIC HERE" | |
BITTREX_SECRET = "INSERT BITTREX SECRET HERE" | |
# Finally, see the bottom of this file | |
# (do not edit below this point) |