Skip to content

Instantly share code, notes, and snippets.

Real depth in OpenGL / GLSL

http://olivers.posterous.com/linear-depth-in-glsl-for-real

So, many places will give you clues how to get linear depth from the OpenGL depth buffer, or visualise it, or other things. This, however, is what I believe to be the definitive answer:

This link http://www.songho.ca/opengl/gl_projectionmatrix.html gives a good run-down of the projection matrix, and the link between eye-space Z (z_e below) and normalised device coordinates (NDC) Z (z_n below). From there, we have

A   = -(zFar + zNear) / (zFar - zNear);

B = -2zFarzNear / (zFar - zNear);

@0x4D3342
0x4D3342 / unwxapkg.py
Created January 2, 2018 03:54 — forked from thedreamwork/unwxapkg.py
unpack wxapkg
#!/usr/bin/python
# usage python unwxapkg.py filename
import sys,os
import struct
class WxapkgFile:
nameLen = 0
name = ""
var CryptoJS = require('crypto-js')
var request = require('request-promise')
/*
* npm install crypto-js request-promise
* node wx_t1t_hack.js
*/
// export function testEncription(msg, fullKey) {
// var fullKey = fullKey.slice(0, 16)
@0x4D3342
0x4D3342 / blaster.c
Created July 26, 2017 10:43 — forked from yorickdewid/blaster.c
Blaster worm source
/*
DECOMPILED SOURCE FOR MS RPC DCOM BLASTER WORM
<http://robertgraham.com/journal/030815-blaster.c>
This file contains source code for the "msblast.exe" worm
that was launched against the Internet on August 10, 2003.
This "source-code" was decompiled using "IDApro", an
"interactive disassembler". IDA is the most popular tool
@0x4D3342
0x4D3342 / apk-embed-payload.rb
Created May 4, 2017 00:50 — forked from skulltech/apk-embed-payload.rb
POC for injecting Metasploit payloads on arbitrary APKs
#!/usr/bin/env ruby
# apk_backdoor.rb
# This script is a POC for injecting metasploit payloads on
# arbitrary APKs.
# Authored by timwr, Jack64
#
require 'nokogiri'
require 'fileutils'