This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function jhexdump(array) { | |
if(!array) return; | |
console.log("---------jhexdump start---------"); | |
var ptr = Memory.alloc(array.length); | |
for(var i = 0; i < array.length; ++i) | |
Memory.writeS8(ptr.add(i), array[i]); | |
console.log(hexdump(ptr, {offset: 0, length: array.length, header: false, ansi: false})); | |
console.log("---------jhexdump end---------"); | |
} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
def fix_name(name: str): | |
''' | |
去除可能存在的非法字符 | |
''' | |
exclude_chars = ["\\", "/", ":", ":", "*", "?", "\"", "<", ">", "|", "\r", "\n", "\t"] | |
# 去除非法符号 | |
name = ''.join(char if char not in exclude_chars else ' ' for char in name) | |
# 将之前连续的非法符号 改为单个 _ | |
return '_'.join(name.split()) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
''' | |
作者: weimo | |
创建日期: 2020-11-02 22:35:31 | |
上次编辑时间: 2020-11-02 22:55:12 | |
一个人的命运啊,当然要靠自我奋斗,但是... | |
''' | |
import sys | |
import gzip | |
from pathlib import Path |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$args = "path/to/paste/file" | |
$height = -2.333 | |
$results = Select-String -Path $args -Pattern '(\d+[ |\t]{1})?(-?\d+\.?\d+)([ |\t]{1})(-?\d+\.?\d+)' -AllMatches | |
$ScriptPath = Split-Path -Parent $MyInvocation.MyCommand.Definition | |
$ScriptPath = $ScriptPath + '\' + [System.IO.Path]::GetFileNameWithoutExtension($args) + '.csv' | |
$results | foreach{ | |
$newline = "{0:0.000000},{1:0.000000},{2:0.000000}" -F [Double] $_.Matches[0].groups[2].value, [Double] $_.Matches[0].groups[4].value, $height | |
$newline | Out-File -Encoding UTF8 -Append $ScriptPath | |
} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
from __future__ import print_function | |
import frida | |
import sys | |
session = frida.attach("chrome.exe") | |
script = session.create_script(""" | |
var baseAddr = Module.findBaseAddress("chrome.exe"); | |
print("chrome.exe baseAddress is at :"+baseAddr); |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
### Keybase proof | |
I hereby claim: | |
* I am xhlove on github. | |
* I am xhlove (https://keybase.io/xhlove) on keybase. | |
* I have a public key ASAZcYiIT8HJX42n3c1UN54URbLtogsFW93FUYjy_gmWAQo | |
To claim this, I am signing this object: |