Skip to content

Instantly share code, notes, and snippets.

View stefanschneider's full-sized avatar

Stefan Schneider stefanschneider

View GitHub Profile
@stefanschneider
stefanschneider / README.md
Created December 20, 2018 11:16 — forked from bobrik/README.md
CFS hiccups
@stefanschneider
stefanschneider / root.sh
Created October 27, 2016 09:03 — forked from Arinerron/root.sh
"Root" via dirtyc0w privilege escalation exploit (automation script) / Android (32 bit)
#!/bin/bash
# Give the usual warning.
clear;
echo "[INFO] Automated Android root script started.\n\n[WARN] Exploit requires sdk module \"NDK\".\nFor more information, visit the installation guide @ https://goo.gl/E2nmLF\n[INFO] Press Ctrl+C to stop the script if you need to install the NDK module. Waiting 10 seconds...";
sleep 10;
clear;
# Download and extract exploit files.
echo "[INFO] Downloading exploit files from GitHub...";
@stefanschneider
stefanschneider / win32.go
Created June 24, 2016 08:50 — forked from nathan-osman/win32.go
Simple Windows GUI application written in Go
package main
import (
"log"
"syscall"
"unsafe"
)
var (
kernel32 = syscall.NewLazyDLL("kernel32.dll")
// handles-play.cpp : Defines the entry point for the console application.
//
#include "stdafx.h"
#include <string>
#include <iostream>
#include <map>
using namespace std;