I hereby claim:
- I am zznop on github.
- I am zznop (https://keybase.io/zznop) on keybase.
- I have a public key ASCst2e_8yle-NJFKKbC4oj_XR_E9BuuTRVh2Z6qXJShngo
To claim this, I am signing this object:
| from binaryninja import BinaryView, FirmwareNinja, FirmwareNinjaMemoryAccessType, StructureType | |
| from binaryninja.variable import ConstantPointerRegisterValue, ConstantRegisterValue | |
| from Vector35_Sidekick.scripting.api import open_index | |
| def _read_write_memory_accesses(bv: BinaryView, fwn: FirmwareNinja, index) -> None: | |
| for entry in fwn.query_function_memory_accesses(): | |
| func = entry.function | |
| for access in entry.accesses: | |
| is_read = access.type == FirmwareNinjaMemoryAccessType.ReadMemoryAccessType |
| /** | |
| * MIT License | |
| * | |
| * Copyright (c) 2021 Brandon Miller (zznop) | |
| * | |
| * This program decodes SEGA Genesis Game Genie alphanumeric codes and displays the encoded patch information | |
| */ | |
| package main |
| package main; | |
| import( | |
| "github.com/labstack/echo" | |
| "time" | |
| "path/filepath" | |
| "html/template" | |
| "strings" | |
| "os" | |
| "net/http" |
I hereby claim:
To claim this, I am signing this object:
| import ida_segment | |
| import ida_bytes | |
| import idautils | |
| import idaapi | |
| import idc | |
| import re | |
| __author__ = 'zznop' | |
| __copyright__ = 'Copyright 2019, zznop' | |
| __email__ = '[email protected]' |
| # megadrive-loader.py | |
| # zznop 2019 | |
| # | |
| # Load ROM as a flat binary, set processor to 68000, | |
| # and run the script | |
| import idc | |
| import idautils | |
| import ida_bytes | |
| import ida_funcs |
| ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; | |
| ;;; | |
| ;;; Copyright (C), zznop, [email protected] | |
| ;;; | |
| ;;; This software may be modified and distributed under the terms | |
| ;;; of the MIT license. See the LICENSE file for details. | |
| ;;; | |
| ;;; DESCRIPTION | |
| ;;; | |
| ;;; This PoC shellcode is meant to be compiled as a blob and prepended to a ELF |
| /* Plaid CTF 2018 v8 Exploit. Exploit begins around line 240 */ | |
| /* ### Utils, thanks saelo ### */ | |
| // | |
| // Tiny module that provides big (64bit) integers. | |
| // | |
| // Copyright (c) 2016 Samuel Groß | |
| // |
| #include <stdio.h> | |
| #include <stdlib.h> | |
| #include <stdint.h> | |
| void take_int(int j) | |
| { | |
| if (j == 1337) | |
| printf("How could this be? j was never initialized!\n"); | |
| } |
| int is_odd(int number) | |
| { | |
| return number == 0 ? 0 : is_even(abs(number) - 1); | |
| } | |
| int is_even(int number) | |
| { | |
| return number == 0 ? 1 : is_odd(abs(number) - 1); | |
| } |