pocorgtfo
Judge0 API
pocorgtfo | Judge0 API | |
---|---|---|
7 | 10 | |
1,223 | 2,126 | |
- | 3.4% | |
5.8 | 7.3 | |
3 months ago | 5 days ago | |
TeX | HTML | |
- | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
pocorgtfo
-
MIPS Firmware Reverse Engineering - anyone having any success using Ghidra for this?
Your best bet here is to get the base address nailed down (assuming it’s a flat/monolithic image). There are a handful of utilities floating around (binbloom, basefind2) that use various pointer heuristics to try to guess the base address. There’s also a nice trick detailed in PoC||GTFO that you can use pretty reliably.
- Image displays its own MD5 hash
- Gitlab servers are being exploited in DDoS attacks in excess of 1 Tbps
-
smh dumb antivirus software
execute the pdf: https://github.com/angea/pocorgtfo
-
SHA-1 'Fully and Practically Broken' by New Collision
1) People systematically underestimate how easy it is to create collisions that still do something "interesting", like being polyglots. See PoC||GTFO, specifically anything by Ange Albertini, for examples; grep https://github.com/angea/pocorgtfo/blob/master/README.md for "MD5".
1bis) You can use an existing collision to create new collisions. People seem to think you need to generate all the work again from scratch.
1cis) The files do not need to be gigantic.
2) You can do the collision in advance, and publish the malicious version later. What it accomplishes is that the concept of "this Git hash unambiguously specifies a revision" no longer works, and one of them can be malicious.
3) The standard should be "obviously safe beyond a reasonable doubt", not "not obviously unsafe to a non-expert". By the latter standard, pretty much any random encryption construction is fine.
-
Show HN: Redbean: single-file distributable web server
If you want to learn more how these things work I'd highly suggest going through the PoC||GTFO archive (https://github.com/angea/pocorgtfo/blob/master/README.md) and check out entries by Ange Albertini or entries named like "This ZIP is also a PDF".
Judge0 API
-
Why would you use the code interpreter?
There are services like Judge0 which you can use to execute the code in a sandbox. Just send a code as a string and get a result back. You can either use their cloud offering or deploy the container yourself (it is opensource). https://github.com/judge0/judge0
-
Judge0 URL is not accessible
I'm trying to run a local version of the Judge0 compiler, but I can't seem to access it.
-
Storing untrusted client-provided code in a database
I have a front-end app which exposes a code editor where the user can provide some code and it will be compiled and executed using judge0 (so not on my server). I would like to be able to save the code created by a user, but I'm not sure of the best route to do this. My initial thought was to save the code as a string in a database, passing through my back-end which could potentially have some sanitizing methods to try and minimize any danger with this. However, I'm not sure how practical/feasible it is to try and sanitize code - has anyone attempted to do this previously or have experience in this domain?
- Built a website for practicing Python
-
Any idea on how to built a code compilation system that can be deployed online or if there exists one already that can be used.
You can deploy Judge0 Extra CE on your own servers for free. Here are the release notes that include the deployment procedure.
- Online compilers/interpretters for (python, go, etc)
-
Creating(or importing) a Code Sandbox or an online IDE to be used in a Django website.
https://judge0.com/ to run the code, you can can host it on your server for free or use their api.
- Gitlab servers are being exploited in DDoS attacks in excess of 1 Tbps
-
run code in django
A signal gets called which gets sent over Django Channels (but you can probably use an mq or something for this) which notifies a microservice that is responsible for sending and receiving submissions to an instance of https://judge0.com/
-
Let’s Deploy our Online Code Executor in Google Cloud
wget https://github.com/judge0/judge0/releases/download/v1.12.0/judge0-v1.12.0.zip unzip judge0-v1.12.0.zip
What are some alternatives?
gitlab-workhorse
Code-Server - VS Code in the browser
polyshell - A Bash/Batch/PowerShell polyglot!
Zalenium - A flexible and scalable container based Selenium Grid with video recording, live preview, basic auth & dashboard.
exiftool - ExifTool meta information reader/writer
Codiad - Web Based, Cloud IDE
RedBean - ORM layer that creates models, config and database on the fly
Koding
sha1collisiondetection - Library and command line tool to detect SHA-1 collision in a file
RequestBin
Metasploit - Metasploit Framework
RStudio Server - RStudio is an integrated development environment (IDE) for R