{{ message }}

Instantly share code, notes, and snippets.

😎

# Brandon Millerzznop

😎
Created Jul 3, 2017
View keybase.md

### Keybase proof

I hereby claim:

• I am zznop on github.
• I am zznop (https://keybase.io/zznop) on keybase.
• I have a public key ASBbxPpeB6WStkXl4MEHA016MFr8cqqBJGpV6OxAhl53MAo

To claim this, I am signing this object:

Created Dec 16, 2017
View recursion-example-1.c
 uint32_t factorial(uint32_t number) { if (number <= 1) { return 1; } return number * factorial(number -1); }
Created Dec 16, 2017
View recursion-example-2.c
 int is_odd(int number) { return number == 0 ? 0 : is_even(abs(number) - 1); } int is_even(int number) { return number == 0 ? 1 : is_odd(abs(number) - 1); }
Created Dec 16, 2017
View uninit-vuln.c
 #include #include #include void take_int(int j) { if (j == 1337) printf("How could this be? j was never initialized!\n"); }
Created May 8, 2018 — forked from itszn/d8.js
Plaid CTF 2018 d8 exploit
View d8.js
 /* Plaid CTF 2018 v8 Exploit. Exploit begins around line 240 */ /* ### Utils, thanks saelo ### */ // // Tiny module that provides big (64bit) integers. // // Copyright (c) 2016 Samuel Groß //
Created Jul 13, 2019
View call-table-enum.py
 import ida_segment import ida_bytes import idautils import idaapi import idc import re __author__ = 'zznop' __copyright__ = 'Copyright 2019, zznop' __email__ = 'zznop0x90@gmail.com'
Created May 31, 2020
keybase.md
View keybase.md

### Keybase proof

I hereby claim:

• I am zznop on github.
• I am zznop (https://keybase.io/zznop) on keybase.
• I have a public key ASCst2e_8yle-NJFKKbC4oj_XR_E9BuuTRVh2Z6qXJShngo

To claim this, I am signing this object:

Last active Jun 25, 2020
Fun little loader shellcode that executes an ELF in-memory using an anonymous file descriptor (inspired by https://x-c3ll.github.io/posts/fileless-memfd_create/)