Skip to content

Instantly share code, notes, and snippets.

View mrexodia's full-sized avatar
❤️
‌‌

Duncan Ogilvie mrexodia

❤️
‌‌
View GitHub Profile
@GuiBibeau
GuiBibeau / 1.txt
Last active April 18, 2025 14:46
Vibe architecting prompts
I want you to refine this brainstorming document into a prompt for a deep research system that will be tasked with writing a technical spike
research document on a software engineering project. The goal of this research is to help guide future agentic coding systems into
having a good understanding of the technical landscape around the software the user wants to create.
<context>
Deep research is a category of product where large language models capable of test time compute are paired with capacities to:
- search the web
- browse documentatin
- read research paper
- further refine their research based on their finding
@VictorTaelin
VictorTaelin / spec.md
Created February 26, 2025 15:51
SupTT Spec

The Interaction Calculus

The Interaction Calculus (IC) is term rewriting system inspired by the Lambda Calculus (λC), but with some major differences:

  1. Vars are affine: they can only occur up to one time.
  2. Vars are global: they can occur anywhere in the program.
  3. There is a new core primitive: the superposition.

An IC term is defined by the following grammar:

@pizlonator
pizlonator / pizlossa.md
Last active February 27, 2025 05:26
Pizlo SSA Form (short version)

Here's a much more complete description of how I do SSA, beyond just how I do Phis.

This describes how I do SSA form, which avoids the need to have any coupling between CFG data structures and SSA data structures.

Let's first define a syntax for SSA and some terminology. Here's an example SSA node:

A = Add(B, C)

In reality, this will be a single object in your in-memory representation, and the names are really addresses of those objects. So, this node has an "implicit variable" called A; it's the variable that is implicitly assigned to when you execute the node. If you then do:

@hackermondev
hackermondev / research.md
Last active April 19, 2025 17:13
Unique 0-click deanonymization attack targeting Signal, Discord and hundreds of platform

hi, i'm daniel. i'm a 15-year-old high school junior. in my free time, i hack billion dollar companies and build cool stuff.

3 months ago, I discovered a unique 0-click deanonymization attack that allows an attacker to grab the location of any target within a 250 mile radius. With a vulnerable app installed on a target's phone (or as a background application on their laptop), an attacker can send a malicious payload and deanonymize you within seconds--and you wouldn't even know.

I'm publishing this writeup and research as a warning, especially for journalists, activists, and hackers, about this type of undetectable attack. Hundreds of applications are vulnerable, including some of the most popular apps in the world: Signal, Discord, Twitter/X, and others. Here's how it works:

Cloudflare

By the numbers, Cloudflare is easily the most popular CDN on the market. It beats out competitors such as Sucuri, Amazon CloudFront, Akamai, and Fastly. In 2019, a major Cloudflare outage k

@oopsmishap
oopsmishap / tttlauncher.cpp
Last active January 28, 2025 21:46
TTDRecord Wrapper
#include <windows.h>
#include <stdio.h>
#include <wchar.h>
#include <Unknwn.h>
typedef enum _TTD_LOG_LEVEL
{
TTD_LOG_LEVEL_ERROR = 1,
TTD_LOG_LEVEL_WARNING,
TTD_LOG_LEVEL_INFO,

Patching the IDA Pro 9.0 BETA

Note

Obligatory disclaimer: this is for educational purposes only. I am not responsible for any damages caused by following this guide, or using any of the script(s) herein.

This guide prioritizes arm64 macOS, but may also work for other platforms.


Step 1 - Patching dylibs

@qwerty472123
qwerty472123 / CertInjector.cpp
Last active April 2, 2025 16:30
Cert hooks for IDA Pro
#include "CertInjector.h"
#include "MinHook.h"
#include <string>
#include <unordered_set>
#define COUNT_OF(arr) (sizeof(arr) / sizeof(*arr))
// #define PRINT_DEBUG
@assarbad
assarbad / VMProtect.md
Created March 27, 2024 22:52
Links to VMProtect related resources

What to debug?

Hyper-v worker process

  • User mode debugging (easy).
  • Symbols available.
  • Attack surface: mostly Gen-1 VMs, device emulation, x86 emulation (for MMIO accesses).

Debugging options:

  1. Attach to running process with WinDbg.
@hugsy
hugsy / offbyonesec-sync-binja.py
Created February 16, 2024 21:27
Scripts written during Off by One Security stream
#
# Port to binary ninja of the script written during the Off-by-One Security stream
# (https://youtu.be/FnIQTL9w-Ow) to synchronize GEF with Binary Ninja
# Requires `rpyc` and `pygments`
#
# In IDA, first download and load https://gist.githubusercontent.com/hugsy/714e0038d5d0b1deb7fad1907928252f/raw/87bd608a859c1699f9fc2fb556394d618747bdc8/binja_rpyc_snippet.py
#
# @_hugsy_
#
import rpyc