Skip to content

Instantly share code, notes, and snippets.

View sqrtZeroKnowledge's full-sized avatar
💭
ME VERSUS ME

TOUHAMI KASBAOUI sqrtZeroKnowledge

💭
ME VERSUS ME
View GitHub Profile
@sqrtZeroKnowledge
sqrtZeroKnowledge / Expiro-Xloader
Last active January 6, 2025 14:27
This a simple and brief analysis about Expiro and Xloader
https://www.virustotal.com/gui/file/14bf2f2b4879370d9fe788186214c1f02cdcf3b732165edeef29e6a84363b764/relations
https://x.com/James_inthe_box/status/1866530426216648845
Content:
```
An #expiro (believe it or not) dropping #xloader
https://app.any.run/tasks/43f807db-2361-4807-8e05-19831c56b5e4
@sqrtZeroKnowledge
sqrtZeroKnowledge / Exploit.py
Last active September 22, 2018 18:07
0ctf2018 babyheap pwn
#Author: TOuHami Kasbaoui || 0BteMosLab
from pwn import *
import sys
HOST='202.120.7.204'
PORT=127
if len(sys.argv)>1:
r=remote(HOST,PORT)
@sqrtZeroKnowledge
sqrtZeroKnowledge / Rensomware.pl
Created January 25, 2018 01:04
We have a script explain how Ransomwares work with programming language Perl
#!/usr/bin/perl
# Perl Virus Generator
####### Strings
$header = <<'HEADER' ;
###################################################
############## Perl Virus Generator ###############
@sqrtZeroKnowledge
sqrtZeroKnowledge / Specter&Meltdown
Last active January 11, 2018 20:01
Replay Explotation Meltdown&Specter Intel
#include <stdio.h>
#include <stdlib.h>
#include <stdint.h>
#ifdef _MSC_VER
#include <intrin.h> /* for rdtscp and clflush */
#pragma optimize("gt",on)
#else
#include <x86intrin.h> /* for rdtscp and clflush */
#endif
@sqrtZeroKnowledge
sqrtZeroKnowledge / LED0BtEMos.ino
Created November 8, 2017 23:24
Hardware, Reverse Engineering
/*
___ ____ _
/ _ \| __ )| |_ ___ _ __ ___ ___ ___
| | | | _ \| __/ _ \ '_ ` _ \ / _ \/ __|
| |_| | |_) | || __/ | | | | | (_) \__ \
\___/|____/ \__\___|_| |_| |_|\___/|___/
Touhami Kasbaoui / VBHS / 0BTEMOS
*/
int led = 13; // you will put pin+ in Digital case 13
;----------------------------------------
;
; :: XOR ENCRYPT ::
; usage: ./xor <message> <key>
; VBHS/ TOuhami Kasbaoui
;---------------------------------------
[BITS 64]
@sqrtZeroKnowledge
sqrtZeroKnowledge / eXploit.py
Created September 5, 2017 01:48
Tokyo Westerns CTF 3rd 2017 - Palindromes Pairs - Coding Phase
#usr/bin/python
#TOUHAMI KASBAOUI
#VBHS
from pwn import *
### [PPC] Tokyo Westerns CTF 3rd 2017 - Palindromes Pairs - Coding Phase
def palindrome(num):
return num == num[::-1]