Skip to content

Instantly share code, notes, and snippets.

View Tester2009's full-sized avatar
💭
breathing

Мухаммад Алифф Муаззам Tester2009

💭
breathing
View GitHub Profile
@Tester2009
Tester2009 / getPETimestamp.py
Created June 28, 2017 05:27 — forked from geudrik/getPETimestamp.py
Read the PE Timestamp from a Windows Executable (PE) in Python
#! /usr/bin/env python2.7
#
# Author: Pat Litke (C) 2014
#
# This code is released under the WTFPL V2 http://www.wtfpl.net/
#
# License:
# DO WHAT THE FUCK YOU WANT TO PUBLIC LICENSE
# TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
#
@Tester2009
Tester2009 / hex_to_rgb.py
Created June 15, 2017 22:11 — forked from matthewkremer/hex_to_rgb.py
Python Hex Code to RGB Value
def hex_to_rgb(hex):
hex = hex.lstrip('#')
hlen = len(hex)
return tuple(int(hex[i:i+hlen/3], 16) for i in range(0, hlen, hlen/3))
@Tester2009
Tester2009 / 32.asm
Created June 13, 2017 05:19 — forked from ericandrewlewis/32.asm
NASM Hello World for x86 and x86_64 Intel Mac OS X(get yourself an updated nasm with brew)
; /usr/local/bin/nasm -f macho 32.asm && ld -macosx_version_min 10.7.0 -o 32 32.o && ./32
global start
section .text
start:
push dword msg.len
push dword msg
push dword 1
mov eax, 4
@Tester2009
Tester2009 / annotations.xml
Created June 10, 2017 14:33 — forked from Neo23x0/annotations.xml
Sources for APT Groups and Operations Search Engine
<?xml version="1.0" encoding="UTF-8" ?>
<Annotations start="0" num="126" total="126">
<Annotation about="blog.malwaremustdie.org/*" timestamp="0x0005408aeb576862" href="ChlibG9nLm1hbHdhcmVtdXN0ZGllLm9yZy8qEOLQ3dqukdAC">
<Label name="_cse_turlh5vi4xc" />
<AdditionalData attribute="original_url" value="http://blog.malwaremustdie.org/" />
</Annotation>
<Annotation about="blog.airbuscybersecurity.com/*" timestamp="0x0005408aea73fd53" href="Ch5ibG9nLmFpcmJ1c2N5YmVyc2VjdXJpdHkuY29tLyoQ0_rP066R0AI">
<Label name="_cse_turlh5vi4xc" />
<AdditionalData attribute="original_url" value="http://blog.airbuscybersecurity.com/" />
</Annotation>
@Tester2009
Tester2009 / currency_symbols.php
Created June 9, 2017 17:32 — forked from wuyiadepoju/currency_symbols.php
An array of currency symbols as HTML entities
<?php
$currency_symbols = array(
'AED' => '&#1583;.&#1573;', // ?
'AFN' => '&#65;&#102;',
'ALL' => '&#76;&#101;&#107;',
'AMD' => '',
'ANG' => '&#402;',
'AOA' => '&#75;&#122;', // ?
'ARS' => '&#36;',
'AUD' => '&#36;',
@Tester2009
Tester2009 / eternalblue8_exploit.py
Created May 18, 2017 08:21 — forked from worawit/eternalblue8_exploit.py
Eternalblue exploit for Windows 8/2012
#!/usr/bin/python
from impacket import smb
from struct import pack
import os
import sys
import socket
'''
EternalBlue exploit for Windows 8 and 2012 by sleepya
The exploit might FAIL and CRASH a target system (depended on what is overwritten)
#!/usr/bin/python
from impacket import smb
from struct import pack
import os
import sys
import socket
'''
EternalBlue exploit for Windows 7/2008 by sleepya
The exploit might FAIL and CRASH a target system (depended on what is overwritten)
@Tester2009
Tester2009 / ela.py
Created November 15, 2016 07:32 — forked from ewencp/ela.py
Quick, simple implementation of Error Level Analysis
#!/usr/bin/env python
# This is a really simple implementation of ELA as described in
# http://blackhat.com/presentations/bh-dc-08/Krawetz/Whitepaper/bh-dc-08-krawetz-WP.pdf
# You shouldn't actually use it, or at least read the paper carefully
# and implement more of the techniques before drawing any conclusions.
from PIL import Image, ImageChops, ImageEnhance
import sys, os.path