Vulnerability Summary: Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specifie
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# SPDX-License-Identifier: GPL-3.0-or-later | |
# Copyright (C) 2024 S. 'Walter' Ji | |
import cv2 | |
import numpy as np | |
import glob | |
import subprocess | |
def create_matrix_frame(image_paths, rows=5, cols=8): | |
''' |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# This file is derived from RISC-V CMake cross compile template. | |
# Please install or put MIPS-MTI-ELF(or other) toolchain in your path before using this toolchain file. | |
#include(CMakeForceCompiler) | |
# usage | |
# cmake -DCMAKE_TOOLCHAIN_FILE={PATH_TO_TOOLCHAINS}/mips-mti.cmake {BUILD_SOURCE} | |
# or | |
# include(${CMAKE_CURRENT_SOURCE_DIR}/{PATH_TO_TOOLCHAINS}/mips-mti.cmake) | |
# Look for GCC in path |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@echo off | |
setlocal | |
rem Put this file under your destination folder | |
rem and drag your file(s) onto this bat for hardlinking. | |
rem Remember to check the path while prompt. | |
rem This only works after Windwos 7(incl.) | |
rem i.e. windows versions with fsutil included. | |
SET DEST=%~dp0 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Windows Registry Editor Version 5.00 | |
[-HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\NameSpace\{679F137C-3162-45da-BE3C-2F9C3D093F64}] |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# @LICENSE: CC-BY 4.0 By @709924470 | |
# This simple script creates prompts for you to enter python commands, and will display results in log window | |
# Tested with x64dbg + x64dbgpy + Python 2.7.13 | |
inp = None | |
Gui = pluginsdk.gui | |
import code | |
shell = code.InteractiveConsole(locals=globals()) | |
while inp not in ["exit()"]: | |
inp = Gui.InputLine("Command") | |
if not inp: |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// Android native hooks By @709924470 | |
// CC-BY-NC 4.0 | |
var moduleName = "libmain.so"; // Module name gose here | |
var hookFunctions = [ | |
{ | |
name: "Java_com_example_hellojni_getstr", // Function name goes here | |
onEnter: function(args){ | |
// TODO: your code here | |
}, | |
onLeave: function(ret){ |