misc-scripts | standalone scripts to small/quick for their own repos
kandi X-RAY | misc-scripts Summary
kandi X-RAY | misc-scripts Summary
[Project Status: Active - The project has reached a stable, usable state and is being actively developed.] This is a collection of miscellaneous scripts that I’ve written or modified for my use. Hopefully they may be of some use to others. When I get a chance, I’ll try and update this readme with descriptions of all of the scripts. Unless otherwise noted, these are distributed under the terms of the LICENSE file.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
- Run the simulation
- Return the dt for a given field
- Convert datetime to naturaltime
- Determine the date of the given row
- Writes content to GitHub
- Log a response
- Read num_samples samples from the device
- Run elvui
- Search log files
- Parse command line arguments
- Return the name of the git user
- Callback called when an action is received
- Run the IAM user
- Connect to a UniFi controller
- Connect to Jira
- Generate a config file
- Compare two packages
- Generate HTML report table
- Parse command line options
- Backup the given forum
- Runs the experiment
- Show usage for subnet
- Searches log files
- Parse the command line options
- Create labels
- Gets the microcenter
- List all cases for a particular service
misc-scripts Key Features
misc-scripts Examples and Code Snippets
Community Discussions
Trending Discussions on misc-scripts
QUESTION
I'm currently going through "Hacking; the Art of Exploitation", and am practicing writing shell code injections on some example code I wrote up.
I'm injecting shell code as an environment variable. In lldb I can see that I am overwriting the return address, and that the EIP is being set to the middle of my NOP sled. However, it then throws "EXC_BAD_ACCESS" and segfaults.
Here's the part of the stack with my shellcode:
...ANSWER
Answered 2017-Feb-19 at 21:01From the Apple developer documentation:
There are two ways to make the stack and heap executable:
Pass the -allow_stack_execute flag to the compiler. This makes the stack (not the heap) executable.
Use the mprotect system call to mark specific memory pages as executable. The details are beyond the scope of this document. For more information, see the manual page for mprotect.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install misc-scripts
You can use misc-scripts like any standard Python library. You will need to make sure that you have a development environment consisting of a Python distribution including header files, a compiler, pip, and git installed. Make sure that your pip, setuptools, and wheel are up to date. When using pip it is generally recommended to install packages in a virtual environment to avoid changes to the system.
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page