Skip to content

Instantly share code, notes, and snippets.

@TristanOrta
TristanOrta / PBNI smtp powerbuilder
Last active July 1, 2022 03:37
Implementation of pbni smtp for sending emails with Powerbuilder /implementacion de pbni smtp para envio de correos con powerbuilder
// call the function "f_envia_smtp_pbni" with the following parameters
string ls_recipient = 'Oscar Tristan <oscar_tristan_13@hotmail.com>'
string ls_subject = 'This is a message sent from PBNI'
string ls_message = 'Hello, I sent this message from PB'
string ls_attach = 'My file path'
f_envia_smtp_pbni(ls_recipient,ls_subject,ls_message,ls_attach)
@TristanOrta
TristanOrta / oracle 9i - powerbuilder not recognize the Oracle TNSNames.md
Last active December 15, 2023 19:38
Installation of Powerbuilder with Oracle 9i / Instalación de powerbuilder con oracle 9i

Installation of PowerBuilder with Oracle 9i

These instructions are meant to address the error generated by PowerBuilder when used with Oracle 9i, which does not recognize the Oracle TNSNames when creating a data profile. This bug is fixed in Oracle 11.

  1. Install the Oracle 9i client:

    • Begin by installing the Oracle 9i client in the usual manner.
  2. Run PowerBuilder Installer:

    • Run the PowerBuilder installer and follow the provided instructions.
@TristanOrta
TristanOrta / weight capture, serial port to powerbuilder
Last active June 28, 2022 22:14
weight capture of a scale through serial COM port to powerbuilder
//this module corresponds to an OleCustomControl object of powerbuilder, the read COM port function is called, which is also among my GIST
String ls_car
integer peso
// the object is read until a 6-digit result is obtained if the ascci character 10 is detected
if MSCOMM_LEER_PESO_LO.object.CommEvent = 2 then
ls_car = MSCOMM_LEER_PESO_LO.object.Input
if Asc(ls_car) = 13 then Return
@stong
stong / tee.py
Last active April 29, 2022 04:48
Duplicate pwntools process output to stdout with tee(2) syscall
import sys
import os
from pwn import *
def tee_process(p):
import threading
import ctypes
libc = ctypes.CDLL(None)
splice = libc.splice
tee = libc.tee
@farazsth98
farazsth98 / harekaze_mini_ctf_2020.md
Last active February 27, 2021 05:24
Harekaze mini CTF 2020

I played Harekaze Mini CTF 2020 for about 3 hours this weekend. The pwn challenges were nice (I especially enjoyed nm-game-extreme). Here are some short writeups.

shellcode

The program just tells you to provide shellcode that will execute execve("/bin/sh", NULL, NULL). It gives you the address of the "/bin/sh" string, so you just create shellcode to do the job and send it:

#!/usr/bin/env python3

from pwn import *
@geohot
geohot / prius_kf.py
Last active March 9, 2021 07:36
Prius Steering Angle Kalman Filter
%pylab inline
%load_ext autoreload
%autoreload 2
from tools.lib.route import Route
from tools.lib.logreader import LogReader
r,num = Route("ce2fbd370f78ef21|2020-11-27--16-27-28"),10
#r,num = Route("f66032c2b5aa18ac|2020-12-04--09-33-54"),30
alr = []
for n in range(num-1, num+5):
@LiveOverflow
LiveOverflow / hireme.ipynb
Created November 20, 2020 10:46
Hire me!!!!!!!!
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
@byt3bl33d3r
byt3bl33d3r / eventvwr_crash.py
Created September 18, 2020 08:12
Crash the Windows Event Log service remotely (needs admin privs)
# Crash the Windows Event Log Service remotely, needs Admin privs
# originally discovered by limbenjamin and accidently re-discovered by @byt3bl33d3r
#
# Once the service crashes 3 times it will not restart for 24 hours
#
# https://github.com/limbenjamin/LogServiceCrash
# https://limbenjamin.com/articles/crash-windows-event-logging-service.html
#
# Needs the impacket library (https://github.com/SecureAuthCorp/impacket)
@muff-in
muff-in / resources.md
Last active May 19, 2024 21:45
A curated list of Assembly Language / Reversing / Malware Analysis / Game Hacking-resources
from pwn import *
PATH = "./prison_heap_hard"
ENV = {"LD_PRELOAD":"./libc-2.27.so"}
REMOTE = False
OFFSET_LEAK = 0x3ED8C0
OFFSET_SYSTEM = 0x000000000004f440
OFFSET_FREEHOOK = 0x00000000003ed8e8